handouts/ho03.tex
changeset 212 1d2744383b7a
parent 211 e6e160c7ea33
child 213 9c2fa54c7c2d
equal deleted inserted replaced
211:e6e160c7ea33 212:1d2744383b7a
     6 
     6 
     7 \section*{Handout 3 (Buffer Overflow Attacks)}
     7 \section*{Handout 3 (Buffer Overflow Attacks)}
     8 
     8 
     9 By far the most popular attack method on computers are buffer
     9 By far the most popular attack method on computers are buffer
    10 overflow attacks or simple variations thereof. The popularity is
    10 overflow attacks or simple variations thereof. The popularity is
    11 unfortunate because we now have technology to prevent them
    11 unfortunate because we nowadays have technology in place to prevent them
    12 effectively. But these kind of attacks are still very relevant
    12 effectively. But these kind of attacks are still very relevant
    13 even today since there are many legacy systems out there and
    13 even today since there are many legacy systems out there and
    14 also many modern embedded systems do not take any precautions
    14 also many modern embedded systems do not take any precautions
    15 to prevent such attacks.
    15 to prevent such attacks.
    16 
    16