handouts/ho03.tex
changeset 257 9bc912fcedb6
parent 240 4b2eeb0ddd81
child 258 8cf5450bb2aa
--- a/handouts/ho03.tex	Tue Oct 21 12:42:19 2014 +0100
+++ b/handouts/ho03.tex	Wed Oct 22 23:38:02 2014 +0100
@@ -7,6 +7,29 @@
 
 \section*{Handout 3 (Buffer Overflow Attacks)}
 
+\begin{center}
+\begin{tikzpicture}
+\begin{axis}[xlabel={\pcode{a}s},ylabel={time in secs},
+    enlargelimits=false,
+    xtick={0,5,...,30},
+    xmax=30,
+    ymax=35,
+    ytick={0,5,...,30},
+    scaled ticks=false,
+    axis lines=left,
+    width=5cm,
+    height=5cm, 
+    legend entries={Python,Ruby},  
+    legend pos=north west,
+    legend cell align=left]
+\addplot[blue,mark=*, mark options={fill=white}] 
+  table {re-python.data};
+\addplot[brown,mark=pentagon*, mark options={fill=white}] 
+  table {re-ruby.data};  
+\end{axis}
+\end{tikzpicture}
+\end{center}
+
 By far the most popular attack method on computers are buffer
 overflow attacks or variations thereof. The first Internet
 worm (Morris) exploited exactly such an attack. The popularity