diff -r e272713e34ff -r 9bc912fcedb6 handouts/ho03.tex --- a/handouts/ho03.tex Tue Oct 21 12:42:19 2014 +0100 +++ b/handouts/ho03.tex Wed Oct 22 23:38:02 2014 +0100 @@ -7,6 +7,29 @@ \section*{Handout 3 (Buffer Overflow Attacks)} +\begin{center} +\begin{tikzpicture} +\begin{axis}[xlabel={\pcode{a}s},ylabel={time in secs}, + enlargelimits=false, + xtick={0,5,...,30}, + xmax=30, + ymax=35, + ytick={0,5,...,30}, + scaled ticks=false, + axis lines=left, + width=5cm, + height=5cm, + legend entries={Python,Ruby}, + legend pos=north west, + legend cell align=left] +\addplot[blue,mark=*, mark options={fill=white}] + table {re-python.data}; +\addplot[brown,mark=pentagon*, mark options={fill=white}] + table {re-ruby.data}; +\end{axis} +\end{tikzpicture} +\end{center} + By far the most popular attack method on computers are buffer overflow attacks or variations thereof. The first Internet worm (Morris) exploited exactly such an attack. The popularity