hws/hw03.tex
changeset 389 9019f84ef99c
parent 276 d7109c6e721d
child 392 4dff36e2bbc6
--- a/hws/hw03.tex	Mon Sep 28 21:02:01 2015 +0100
+++ b/hws/hw03.tex	Mon Sep 28 23:17:35 2015 +0100
@@ -1,17 +1,21 @@
 \documentclass{article}
-\usepackage{charter}
-\usepackage{hyperref}
+\usepackage{../style}
+
 
 \begin{document}
 
 \section*{Homework 3}
 
+\HEADER
+
 \begin{enumerate}
 \item What should the architecture of a network application under Unix
   be that processes potentially hostile data?
 
-\item How can you exploit the fact that every night root has a cron
-  job that deletes the files in \texttt{/tmp}? (Hint: cron-attack)
+\item What is a unikernel system and why is a unikernel
+preferable on a web server system (in contrast to a traditional
+general purpose operating system like Linux).
+
 
 \item How does a buffer-overflow attack work? (Hint: What happens on
   the stack.)
@@ -25,8 +29,8 @@
 \item How does a stack canary help with preventing a buffer-overflow
   attack?
 
-\item Why does randomising the address where programs are run help
-  defending against buffer overflow attacks?
+\item Why does randomising the addresses from where programs 
+  are run help defending against buffer overflow attacks?
 
 \item Assume format string attacks allow you to read out the
   stack. What can you do with this information? (Hint: Consider what