--- a/hws/hw03.tex Mon Oct 05 05:20:07 2015 +0100
+++ b/hws/hw03.tex Mon Oct 05 12:25:47 2015 +0100
@@ -9,13 +9,6 @@
\HEADER
\begin{enumerate}
-\item What should the architecture of a network application under Unix
- be that processes potentially hostile data?
-
-\item What is a unikernel system and why is a unikernel
-preferable on a web server system (in contrast to a traditional
-general purpose operating system like Linux).
-
\item How does a buffer-overflow attack work? (Hint: What happens on
the stack.)
@@ -41,6 +34,10 @@
\item How can the choice of a programming language help with buffer
overflow attacks? (Hint: Why are C-programs prone to such attacks,
but not Java programs.)
+
+\item When filling the buffer that is attacked with a
+payload (starting a shell), what is the purpose of
+padding the string at the beginning with NOP-instructions.
\end{enumerate}
\end{document}