16
|
1 |
\documentclass{article}
|
|
2 |
\usepackage{charter}
|
|
3 |
\usepackage{hyperref}
|
|
4 |
|
|
5 |
\begin{document}
|
|
6 |
|
19
|
7 |
\section*{Homework 2}
|
16
|
8 |
|
|
9 |
\begin{enumerate}
|
19
|
10 |
\item Assume format string attacks allow you to read out the stack. What can you do
|
|
11 |
with this information? (Hint: Consider what is stored in the stack.)
|
16
|
12 |
|
19
|
13 |
\item Assume you can crash a program remotely. Why is this a problem?
|
16
|
14 |
|
19
|
15 |
\item How can the choice of a programming language help with buffer overflow attacks?
|
|
16 |
(Hint: Why are C-programs prone to such attacks, but not Java programs.)
|
16
|
17 |
|
19
|
18 |
\item (Optional) How can a system that separates between \emph{users} and \emph{root} be of any help with buffer overflow attacks?
|
16
|
19 |
\end{enumerate}
|
|
20 |
|
|
21 |
\end{document}
|
|
22 |
|
|
23 |
%%% Local Variables:
|
|
24 |
%%% mode: latex
|
|
25 |
%%% TeX-master: t
|
|
26 |
%%% End:
|