handouts/ho03.tex
changeset 391 a612dd3ddc81
parent 390 92a8dad2cc86
child 395 60f64793266f
equal deleted inserted replaced
390:92a8dad2cc86 391:a612dd3ddc81
    14 worm (Morris) exploited exactly such an attack. The popularity
    14 worm (Morris) exploited exactly such an attack. The popularity
    15 is unfortunate because we nowadays have technology in place to
    15 is unfortunate because we nowadays have technology in place to
    16 prevent them effectively. But these kind of attacks are still
    16 prevent them effectively. But these kind of attacks are still
    17 very relevant even today since there are many legacy systems
    17 very relevant even today since there are many legacy systems
    18 out there and also many modern embedded systems often do not
    18 out there and also many modern embedded systems often do not
    19 take any precautions to prevent such attacks. The plot below shows
    19 take any precautions to prevent such attacks. The plot below
    20 the percentage of buffer overflow attacks listed in the US National 
    20 shows the percentage of buffer overflow attacks listed in the
    21 Vulnerability Database.\footnote{Search for ``Buffer errors'' at 
    21 US National Vulnerability Database.\footnote{Search for
       
    22 ``Buffer errors'' at
    22 \url{http://web.nvd.nist.gov/view/vuln/statistics}.}
    23 \url{http://web.nvd.nist.gov/view/vuln/statistics}.}
    23 
    24 
    24 \begin{center}
    25 \begin{center}
    25 \begin{tikzpicture}
    26 \begin{tikzpicture}
    26 \begin{axis}[
    27 \begin{axis}[