handouts/ho03.tex
changeset 156 3b831b9dc616
child 191 f675aa15b6d0
equal deleted inserted replaced
155:c70342f08326 156:3b831b9dc616
       
     1 \documentclass{article}
       
     2 \usepackage{../style}
       
     3 
       
     4 
       
     5 \begin{document}
       
     6 
       
     7 \section*{Handout 3 (Buffer Overflow Attacks)}
       
     8 
       
     9 By far the most popular attack method on computers are buffer
       
    10 overflow attacks. The popularity is unfortunate since we now
       
    11 have technology to prevent them. But these kind of attacks are
       
    12 still very relevant even today since there are many legacy
       
    13 systems out there and also many modern embedded systems
       
    14 do not take any precautions to prevent such attacks.
       
    15 
       
    16 To understand how buffer overflow attacks work we have to have
       
    17 a look at how computers work ``under the hood'' (on the
       
    18 machine level) and also understand some aspects of the C/C++
       
    19 programming language. This might not be everyday fare for
       
    20 computer science students, but who said that criminal hackers
       
    21 restrict themselves to everyday fare? Not to mention the
       
    22 free-riding script-kiddies who use this technology without
       
    23 knowing what are the underlying ideas.
       
    24  
       
    25 \end{document}
       
    26 
       
    27 %%% Local Variables: 
       
    28 %%% mode: latex
       
    29 %%% TeX-master: t
       
    30 %%% End: