diff -r c70342f08326 -r 3b831b9dc616 handouts/ho03.tex --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/handouts/ho03.tex Wed Sep 03 11:01:14 2014 +0100 @@ -0,0 +1,30 @@ +\documentclass{article} +\usepackage{../style} + + +\begin{document} + +\section*{Handout 3 (Buffer Overflow Attacks)} + +By far the most popular attack method on computers are buffer +overflow attacks. The popularity is unfortunate since we now +have technology to prevent them. But these kind of attacks are +still very relevant even today since there are many legacy +systems out there and also many modern embedded systems +do not take any precautions to prevent such attacks. + +To understand how buffer overflow attacks work we have to have +a look at how computers work ``under the hood'' (on the +machine level) and also understand some aspects of the C/C++ +programming language. This might not be everyday fare for +computer science students, but who said that criminal hackers +restrict themselves to everyday fare? Not to mention the +free-riding script-kiddies who use this technology without +knowing what are the underlying ideas. + +\end{document} + +%%% Local Variables: +%%% mode: latex +%%% TeX-master: t +%%% End: