handouts/ho03.tex
changeset 516 0fbfb0a86fa8
parent 512 174cc952ad36
child 546 3d1f65e43065
equal deleted inserted replaced
515:41d3aea3113d 516:0fbfb0a86fa8
    16 
    16 
    17 % https://github.com/cs01/gdbgui/
    17 % https://github.com/cs01/gdbgui/
    18 % gdb frontend
    18 % gdb frontend
    19 
    19 
    20 \begin{document}
    20 \begin{document}
    21 \fnote{\copyright{} Christian Urban, King's College London, 2014, 2015, 2016}
    21 \fnote{\copyright{} Christian Urban, King's College London, 2014, 2015, 2016, 2017}
    22 
    22 
    23 \section*{Handout 3 (Buffer Overflow Attacks)}
    23 \section*{Handout 3 (Buffer Overflow Attacks)}
    24 
    24 
       
    25 \begin{flushright}
       
    26 \begin{minipage}{9cm}
       
    27 \it ``We took a network that was designed to be resilient to nuclear war and
       
    28 we made it vulnerable to toasters.''\\\mbox{}\hfill\small --- Eben Upton, 2017, RPi co-founder
       
    29 \end{minipage}
       
    30 \end{flushright}\bigskip
       
    31 
       
    32 
       
    33 \noindent
    25 By far the most popular attack method on computers are buffer
    34 By far the most popular attack method on computers are buffer
    26 overflow attacks or variations thereof. The first Internet
    35 overflow attacks or variations thereof. The first Internet
    27 worm (Morris) exploited exactly such an attack. The popularity
    36 worm (Morris) exploited exactly such an attack. The popularity
    28 is unfortunate because we nowadays have technology in place to
    37 is unfortunate because we nowadays have technology in place to
    29 prevent them effectively. But these kind of attacks are still
    38 prevent them effectively. But these kind of attacks are still