equal
deleted
inserted
replaced
|
1 \documentclass{article} |
|
2 \usepackage{../style} |
|
3 |
|
4 |
|
5 \begin{document} |
|
6 |
|
7 \section*{Handout 3 (Buffer Overflow Attacks)} |
|
8 |
|
9 By far the most popular attack method on computers are buffer |
|
10 overflow attacks. The popularity is unfortunate since we now |
|
11 have technology to prevent them. But these kind of attacks are |
|
12 still very relevant even today since there are many legacy |
|
13 systems out there and also many modern embedded systems |
|
14 do not take any precautions to prevent such attacks. |
|
15 |
|
16 To understand how buffer overflow attacks work we have to have |
|
17 a look at how computers work ``under the hood'' (on the |
|
18 machine level) and also understand some aspects of the C/C++ |
|
19 programming language. This might not be everyday fare for |
|
20 computer science students, but who said that criminal hackers |
|
21 restrict themselves to everyday fare? Not to mention the |
|
22 free-riding script-kiddies who use this technology without |
|
23 knowing what are the underlying ideas. |
|
24 |
|
25 \end{document} |
|
26 |
|
27 %%% Local Variables: |
|
28 %%% mode: latex |
|
29 %%% TeX-master: t |
|
30 %%% End: |