equal
deleted
inserted
replaced
14 worm (Morris) exploited exactly such an attack. The popularity |
14 worm (Morris) exploited exactly such an attack. The popularity |
15 is unfortunate because we nowadays have technology in place to |
15 is unfortunate because we nowadays have technology in place to |
16 prevent them effectively. But these kind of attacks are still |
16 prevent them effectively. But these kind of attacks are still |
17 very relevant even today since there are many legacy systems |
17 very relevant even today since there are many legacy systems |
18 out there and also many modern embedded systems often do not |
18 out there and also many modern embedded systems often do not |
19 take any precautions to prevent such attacks. The plot below shows |
19 take any precautions to prevent such attacks. The plot below |
20 the percentage of buffer overflow attacks listed in the US National |
20 shows the percentage of buffer overflow attacks listed in the |
21 Vulnerability Database.\footnote{Search for ``Buffer errors'' at |
21 US National Vulnerability Database.\footnote{Search for |
|
22 ``Buffer errors'' at |
22 \url{http://web.nvd.nist.gov/view/vuln/statistics}.} |
23 \url{http://web.nvd.nist.gov/view/vuln/statistics}.} |
23 |
24 |
24 \begin{center} |
25 \begin{center} |
25 \begin{tikzpicture} |
26 \begin{tikzpicture} |
26 \begin{axis}[ |
27 \begin{axis}[ |