diff -r 98ae49ffc262 -r 62985f147c85 handouts/ho03.tex --- a/handouts/ho03.tex Tue Sep 26 12:03:24 2017 +0100 +++ b/handouts/ho03.tex Tue Sep 26 12:10:41 2017 +0100 @@ -14,11 +14,23 @@ % https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3333 +% https://github.com/cs01/gdbgui/ +% gdb frontend + \begin{document} -\fnote{\copyright{} Christian Urban, King's College London, 2014, 2015, 2016} +\fnote{\copyright{} Christian Urban, King's College London, 2014, 2015, 2016, 2017} \section*{Handout 3 (Buffer Overflow Attacks)} +\begin{flushright} +\begin{minipage}{9cm} +\it ``We took a network that was designed to be resilient to nuclear war and +we made it vulnerable to toasters.''\\\mbox{}\hfill\small --- Eben Upton, 2017, RPi co-founder +\end{minipage} +\end{flushright}\bigskip + + +\noindent By far the most popular attack method on computers are buffer overflow attacks or variations thereof. The first Internet worm (Morris) exploited exactly such an attack. The popularity