handouts/ho03.tex
author Christian Urban <christian dot urban at kcl dot ac dot uk>
Thu, 25 Sep 2014 05:48:08 +0100
changeset 177 46e581d66f3a
parent 156 3b831b9dc616
child 191 f675aa15b6d0
permissions -rw-r--r--
updated

\documentclass{article}
\usepackage{../style}


\begin{document}

\section*{Handout 3 (Buffer Overflow Attacks)}

By far the most popular attack method on computers are buffer
overflow attacks. The popularity is unfortunate since we now
have technology to prevent them. But these kind of attacks are
still very relevant even today since there are many legacy
systems out there and also many modern embedded systems
do not take any precautions to prevent such attacks.

To understand how buffer overflow attacks work we have to have
a look at how computers work ``under the hood'' (on the
machine level) and also understand some aspects of the C/C++
programming language. This might not be everyday fare for
computer science students, but who said that criminal hackers
restrict themselves to everyday fare? Not to mention the
free-riding script-kiddies who use this technology without
knowing what are the underlying ideas.
 
\end{document}

%%% Local Variables: 
%%% mode: latex
%%% TeX-master: t
%%% End: