equal
deleted
inserted
replaced
16 |
16 |
17 % https://github.com/cs01/gdbgui/ |
17 % https://github.com/cs01/gdbgui/ |
18 % gdb frontend |
18 % gdb frontend |
19 |
19 |
20 \begin{document} |
20 \begin{document} |
21 \fnote{\copyright{} Christian Urban, King's College London, 2014, 2015, 2016} |
21 \fnote{\copyright{} Christian Urban, King's College London, 2014, 2015, 2016, 2017} |
22 |
22 |
23 \section*{Handout 3 (Buffer Overflow Attacks)} |
23 \section*{Handout 3 (Buffer Overflow Attacks)} |
24 |
24 |
|
25 \begin{flushright} |
|
26 \begin{minipage}{9cm} |
|
27 \it ``We took a network that was designed to be resilient to nuclear war and |
|
28 we made it vulnerable to toasters.''\\\mbox{}\hfill\small --- Eben Upton, 2017, RPi co-founder |
|
29 \end{minipage} |
|
30 \end{flushright}\bigskip |
|
31 |
|
32 |
|
33 \noindent |
25 By far the most popular attack method on computers are buffer |
34 By far the most popular attack method on computers are buffer |
26 overflow attacks or variations thereof. The first Internet |
35 overflow attacks or variations thereof. The first Internet |
27 worm (Morris) exploited exactly such an attack. The popularity |
36 worm (Morris) exploited exactly such an attack. The popularity |
28 is unfortunate because we nowadays have technology in place to |
37 is unfortunate because we nowadays have technology in place to |
29 prevent them effectively. But these kind of attacks are still |
38 prevent them effectively. But these kind of attacks are still |