handouts/ho03.tex
changeset 534 62985f147c85
parent 516 0fbfb0a86fa8
child 546 3d1f65e43065
--- a/handouts/ho03.tex	Tue Sep 26 12:03:24 2017 +0100
+++ b/handouts/ho03.tex	Tue Sep 26 12:10:41 2017 +0100
@@ -14,11 +14,23 @@
 % https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3333
 
 
+% https://github.com/cs01/gdbgui/
+% gdb frontend
+
 \begin{document}
-\fnote{\copyright{} Christian Urban, King's College London, 2014, 2015, 2016}
+\fnote{\copyright{} Christian Urban, King's College London, 2014, 2015, 2016, 2017}
 
 \section*{Handout 3 (Buffer Overflow Attacks)}
 
+\begin{flushright}
+\begin{minipage}{9cm}
+\it ``We took a network that was designed to be resilient to nuclear war and
+we made it vulnerable to toasters.''\\\mbox{}\hfill\small --- Eben Upton, 2017, RPi co-founder
+\end{minipage}
+\end{flushright}\bigskip
+
+
+\noindent
 By far the most popular attack method on computers are buffer
 overflow attacks or variations thereof. The first Internet
 worm (Morris) exploited exactly such an attack. The popularity