diff -r 770b58a7d754 -r 9019f84ef99c hws/hw03.tex --- a/hws/hw03.tex Mon Sep 28 21:02:01 2015 +0100 +++ b/hws/hw03.tex Mon Sep 28 23:17:35 2015 +0100 @@ -1,17 +1,21 @@ \documentclass{article} -\usepackage{charter} -\usepackage{hyperref} +\usepackage{../style} + \begin{document} \section*{Homework 3} +\HEADER + \begin{enumerate} \item What should the architecture of a network application under Unix be that processes potentially hostile data? -\item How can you exploit the fact that every night root has a cron - job that deletes the files in \texttt{/tmp}? (Hint: cron-attack) +\item What is a unikernel system and why is a unikernel +preferable on a web server system (in contrast to a traditional +general purpose operating system like Linux). + \item How does a buffer-overflow attack work? (Hint: What happens on the stack.) @@ -25,8 +29,8 @@ \item How does a stack canary help with preventing a buffer-overflow attack? -\item Why does randomising the address where programs are run help - defending against buffer overflow attacks? +\item Why does randomising the addresses from where programs + are run help defending against buffer overflow attacks? \item Assume format string attacks allow you to read out the stack. What can you do with this information? (Hint: Consider what