equal
deleted
inserted
replaced
5 \begin{document} |
5 \begin{document} |
6 |
6 |
7 \section*{Handout 3 (Buffer Overflow Attacks)} |
7 \section*{Handout 3 (Buffer Overflow Attacks)} |
8 |
8 |
9 By far the most popular attack method on computers are buffer |
9 By far the most popular attack method on computers are buffer |
10 overflow attacks. The popularity is unfortunate since we now |
10 overflow attacks or variations thereof. The popularity is |
11 have technology to prevent them. But these kind of attacks are |
11 unfortunate because we now have technology to prevent them |
12 still very relevant even today since there are many legacy |
12 effectively. But these kind of attacks are still very relevant |
13 systems out there and also many modern embedded systems |
13 even today since there are many legacy systems out there and |
14 do not take any precautions to prevent such attacks. |
14 also many modern embedded systems do not take any precautions |
|
15 to prevent such attacks. |
15 |
16 |
16 To understand how buffer overflow attacks work we have to have |
17 To understand how buffer overflow attacks work we have to have |
17 a look at how computers work ``under the hood'' (on the |
18 a look at how computers work ``under the hood'' (on the |
18 machine level) and also understand some aspects of the C/C++ |
19 machine level) and also understand some aspects of the C/C++ |
19 programming language. This might not be everyday fare for |
20 programming language. This might not be everyday fare for |