handouts/ho03.tex
changeset 257 9bc912fcedb6
parent 240 4b2eeb0ddd81
child 258 8cf5450bb2aa
equal deleted inserted replaced
256:e272713e34ff 257:9bc912fcedb6
     4 \usetikzlibrary{patterns,decorations.pathreplacing}
     4 \usetikzlibrary{patterns,decorations.pathreplacing}
     5 
     5 
     6 \begin{document}
     6 \begin{document}
     7 
     7 
     8 \section*{Handout 3 (Buffer Overflow Attacks)}
     8 \section*{Handout 3 (Buffer Overflow Attacks)}
       
     9 
       
    10 \begin{center}
       
    11 \begin{tikzpicture}
       
    12 \begin{axis}[xlabel={\pcode{a}s},ylabel={time in secs},
       
    13     enlargelimits=false,
       
    14     xtick={0,5,...,30},
       
    15     xmax=30,
       
    16     ymax=35,
       
    17     ytick={0,5,...,30},
       
    18     scaled ticks=false,
       
    19     axis lines=left,
       
    20     width=5cm,
       
    21     height=5cm, 
       
    22     legend entries={Python,Ruby},  
       
    23     legend pos=north west,
       
    24     legend cell align=left]
       
    25 \addplot[blue,mark=*, mark options={fill=white}] 
       
    26   table {re-python.data};
       
    27 \addplot[brown,mark=pentagon*, mark options={fill=white}] 
       
    28   table {re-ruby.data};  
       
    29 \end{axis}
       
    30 \end{tikzpicture}
       
    31 \end{center}
     9 
    32 
    10 By far the most popular attack method on computers are buffer
    33 By far the most popular attack method on computers are buffer
    11 overflow attacks or variations thereof. The first Internet
    34 overflow attacks or variations thereof. The first Internet
    12 worm (Morris) exploited exactly such an attack. The popularity
    35 worm (Morris) exploited exactly such an attack. The popularity
    13 is unfortunate because we nowadays have technology in place to
    36 is unfortunate because we nowadays have technology in place to