diff -r 41d3aea3113d -r 0fbfb0a86fa8 handouts/ho03.tex --- a/handouts/ho03.tex Sat Jun 03 23:57:07 2017 +0100 +++ b/handouts/ho03.tex Thu Jun 29 16:48:10 2017 +0100 @@ -18,10 +18,19 @@ % gdb frontend \begin{document} -\fnote{\copyright{} Christian Urban, King's College London, 2014, 2015, 2016} +\fnote{\copyright{} Christian Urban, King's College London, 2014, 2015, 2016, 2017} \section*{Handout 3 (Buffer Overflow Attacks)} +\begin{flushright} +\begin{minipage}{9cm} +\it ``We took a network that was designed to be resilient to nuclear war and +we made it vulnerable to toasters.''\\\mbox{}\hfill\small --- Eben Upton, 2017, RPi co-founder +\end{minipage} +\end{flushright}\bigskip + + +\noindent By far the most popular attack method on computers are buffer overflow attacks or variations thereof. The first Internet worm (Morris) exploited exactly such an attack. The popularity