--- a/hws/hw03.tex Mon Sep 28 21:02:01 2015 +0100
+++ b/hws/hw03.tex Mon Sep 28 23:17:35 2015 +0100
@@ -1,17 +1,21 @@
\documentclass{article}
-\usepackage{charter}
-\usepackage{hyperref}
+\usepackage{../style}
+
\begin{document}
\section*{Homework 3}
+\HEADER
+
\begin{enumerate}
\item What should the architecture of a network application under Unix
be that processes potentially hostile data?
-\item How can you exploit the fact that every night root has a cron
- job that deletes the files in \texttt{/tmp}? (Hint: cron-attack)
+\item What is a unikernel system and why is a unikernel
+preferable on a web server system (in contrast to a traditional
+general purpose operating system like Linux).
+
\item How does a buffer-overflow attack work? (Hint: What happens on
the stack.)
@@ -25,8 +29,8 @@
\item How does a stack canary help with preventing a buffer-overflow
attack?
-\item Why does randomising the address where programs are run help
- defending against buffer overflow attacks?
+\item Why does randomising the addresses from where programs
+ are run help defending against buffer overflow attacks?
\item Assume format string attacks allow you to read out the
stack. What can you do with this information? (Hint: Consider what