slides02.tex
changeset 58 2c772c82b13e
parent 23 210856bd3803
equal deleted inserted replaced
57:ecb3f92f54a5 58:2c772c82b13e
   384 
   384 
   385 \small
   385 \small
   386 \texttt{string} is nowhere used:\bigskip
   386 \texttt{string} is nowhere used:\bigskip
   387 
   387 
   388 {\lstset{language=Java}\fontsize{8}{10}\selectfont%
   388 {\lstset{language=Java}\fontsize{8}{10}\selectfont%
   389 \texttt{\lstinputlisting{C6.c}}}\bigskip
   389 \texttt{\lstinputlisting{programs/C4.c}}}\bigskip
   390 
   390 
   391 this vulnerability can be used to read out the stack
   391 this vulnerability can be used to read out the stack
   392   
   392   
   393 \end{frame}}
   393 \end{frame}}
   394 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   394 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
   417 \begin{itemize}
   417 \begin{itemize}
   418 \item Prevent common vulnerabilities from occurring (e.g. buffer overflows)\pause
   418 \item Prevent common vulnerabilities from occurring (e.g. buffer overflows)\pause
   419 \item Recover from attacks (traceability and auditing of security-relevant actions)\pause
   419 \item Recover from attacks (traceability and auditing of security-relevant actions)\pause
   420 \item Monitoring (detect attacks)\pause
   420 \item Monitoring (detect attacks)\pause
   421 \item Privacy, confidentiality, anonymity (to protect secrets)\pause
   421 \item Privacy, confidentiality, anonymity (to protect secrets)\pause
   422 \item Authenticity (eeded for access control)\pause
   422 \item Authenticity (needed for access control)\pause
   423 \item Integrity (prevent unwanted modification or tampering)\pause
   423 \item Integrity (prevent unwanted modification or tampering)\pause
   424 \item Availability and reliability (reduce the risk of DoS attacks)
   424 \item Availability and reliability (reduce the risk of DoS attacks)
   425 \end{itemize}
   425 \end{itemize}
   426   
   426   
   427 \end{frame}}
   427 \end{frame}}