equal
deleted
inserted
replaced
4 \usetikzlibrary{patterns,decorations.pathreplacing} |
4 \usetikzlibrary{patterns,decorations.pathreplacing} |
5 |
5 |
6 \begin{document} |
6 \begin{document} |
7 |
7 |
8 \section*{Handout 3 (Buffer Overflow Attacks)} |
8 \section*{Handout 3 (Buffer Overflow Attacks)} |
|
9 |
|
10 \begin{center} |
|
11 \begin{tikzpicture} |
|
12 \begin{axis}[xlabel={\pcode{a}s},ylabel={time in secs}, |
|
13 enlargelimits=false, |
|
14 xtick={0,5,...,30}, |
|
15 xmax=30, |
|
16 ymax=35, |
|
17 ytick={0,5,...,30}, |
|
18 scaled ticks=false, |
|
19 axis lines=left, |
|
20 width=5cm, |
|
21 height=5cm, |
|
22 legend entries={Python,Ruby}, |
|
23 legend pos=north west, |
|
24 legend cell align=left] |
|
25 \addplot[blue,mark=*, mark options={fill=white}] |
|
26 table {re-python.data}; |
|
27 \addplot[brown,mark=pentagon*, mark options={fill=white}] |
|
28 table {re-ruby.data}; |
|
29 \end{axis} |
|
30 \end{tikzpicture} |
|
31 \end{center} |
9 |
32 |
10 By far the most popular attack method on computers are buffer |
33 By far the most popular attack method on computers are buffer |
11 overflow attacks or variations thereof. The first Internet |
34 overflow attacks or variations thereof. The first Internet |
12 worm (Morris) exploited exactly such an attack. The popularity |
35 worm (Morris) exploited exactly such an attack. The popularity |
13 is unfortunate because we nowadays have technology in place to |
36 is unfortunate because we nowadays have technology in place to |