diff -r a612dd3ddc81 -r 4dff36e2bbc6 hws/hw03.tex --- a/hws/hw03.tex Mon Oct 05 05:20:07 2015 +0100 +++ b/hws/hw03.tex Mon Oct 05 12:25:47 2015 +0100 @@ -9,13 +9,6 @@ \HEADER \begin{enumerate} -\item What should the architecture of a network application under Unix - be that processes potentially hostile data? - -\item What is a unikernel system and why is a unikernel -preferable on a web server system (in contrast to a traditional -general purpose operating system like Linux). - \item How does a buffer-overflow attack work? (Hint: What happens on the stack.) @@ -41,6 +34,10 @@ \item How can the choice of a programming language help with buffer overflow attacks? (Hint: Why are C-programs prone to such attacks, but not Java programs.) + +\item When filling the buffer that is attacked with a +payload (starting a shell), what is the purpose of +padding the string at the beginning with NOP-instructions. \end{enumerate} \end{document}