equal
deleted
inserted
replaced
384 |
384 |
385 \small |
385 \small |
386 \texttt{string} is nowhere used:\bigskip |
386 \texttt{string} is nowhere used:\bigskip |
387 |
387 |
388 {\lstset{language=Java}\fontsize{8}{10}\selectfont% |
388 {\lstset{language=Java}\fontsize{8}{10}\selectfont% |
389 \texttt{\lstinputlisting{C6.c}}}\bigskip |
389 \texttt{\lstinputlisting{programs/C4.c}}}\bigskip |
390 |
390 |
391 this vulnerability can be used to read out the stack |
391 this vulnerability can be used to read out the stack |
392 |
392 |
393 \end{frame}} |
393 \end{frame}} |
394 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
394 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% |
417 \begin{itemize} |
417 \begin{itemize} |
418 \item Prevent common vulnerabilities from occurring (e.g. buffer overflows)\pause |
418 \item Prevent common vulnerabilities from occurring (e.g. buffer overflows)\pause |
419 \item Recover from attacks (traceability and auditing of security-relevant actions)\pause |
419 \item Recover from attacks (traceability and auditing of security-relevant actions)\pause |
420 \item Monitoring (detect attacks)\pause |
420 \item Monitoring (detect attacks)\pause |
421 \item Privacy, confidentiality, anonymity (to protect secrets)\pause |
421 \item Privacy, confidentiality, anonymity (to protect secrets)\pause |
422 \item Authenticity (eeded for access control)\pause |
422 \item Authenticity (needed for access control)\pause |
423 \item Integrity (prevent unwanted modification or tampering)\pause |
423 \item Integrity (prevent unwanted modification or tampering)\pause |
424 \item Availability and reliability (reduce the risk of DoS attacks) |
424 \item Availability and reliability (reduce the risk of DoS attacks) |
425 \end{itemize} |
425 \end{itemize} |
426 |
426 |
427 \end{frame}} |
427 \end{frame}} |