equal
deleted
inserted
replaced
|
1 \documentclass{article} |
|
2 \usepackage{charter} |
|
3 \usepackage{hyperref} |
|
4 |
|
5 \begin{document} |
|
6 |
|
7 \section*{Homework 2} |
|
8 |
|
9 \begin{enumerate} |
|
10 \item Assume format string attacks allow you to read out the stack. What can you do |
|
11 with this information? (Hint: Consider what is stored in the stack.) |
|
12 |
|
13 \item Assume you can crash a program remotely. Why is this a problem? |
|
14 |
|
15 \item How can the choice of a programming language help with buffer overflow attacks? |
|
16 (Hint: Why are C-programs prone to such attacks, but not Java programs.) |
|
17 |
|
18 \item (Optional) How can a system that separates between \emph{users} and \emph{root} be of any help with buffer overflow attacks? |
|
19 \end{enumerate} |
|
20 |
|
21 \end{document} |
|
22 |
|
23 %%% Local Variables: |
|
24 %%% mode: latex |
|
25 %%% TeX-master: t |
|
26 %%% End: |