handouts/ho03.tex
changeset 191 f675aa15b6d0
parent 156 3b831b9dc616
child 196 22f027da67ec
equal deleted inserted replaced
190:4ee6812ab436 191:f675aa15b6d0
     5 \begin{document}
     5 \begin{document}
     6 
     6 
     7 \section*{Handout 3 (Buffer Overflow Attacks)}
     7 \section*{Handout 3 (Buffer Overflow Attacks)}
     8 
     8 
     9 By far the most popular attack method on computers are buffer
     9 By far the most popular attack method on computers are buffer
    10 overflow attacks. The popularity is unfortunate since we now
    10 overflow attacks or variations thereof. The popularity is
    11 have technology to prevent them. But these kind of attacks are
    11 unfortunate because we now have technology to prevent them
    12 still very relevant even today since there are many legacy
    12 effectively. But these kind of attacks are still very relevant
    13 systems out there and also many modern embedded systems
    13 even today since there are many legacy systems out there and
    14 do not take any precautions to prevent such attacks.
    14 also many modern embedded systems do not take any precautions
       
    15 to prevent such attacks.
    15 
    16 
    16 To understand how buffer overflow attacks work we have to have
    17 To understand how buffer overflow attacks work we have to have
    17 a look at how computers work ``under the hood'' (on the
    18 a look at how computers work ``under the hood'' (on the
    18 machine level) and also understand some aspects of the C/C++
    19 machine level) and also understand some aspects of the C/C++
    19 programming language. This might not be everyday fare for
    20 programming language. This might not be everyday fare for