# HG changeset patch # User Christian Urban # Date 1443478655 -3600 # Node ID 9019f84ef99c4edcca2a3f6b2332d0aa4cb05732 # Parent 770b58a7d754befbc6ceb856876cd4d98ea20490 updated hws diff -r 770b58a7d754 -r 9019f84ef99c hws/hw02.pdf Binary file hws/hw02.pdf has changed diff -r 770b58a7d754 -r 9019f84ef99c hws/hw02.tex --- a/hws/hw02.tex Mon Sep 28 21:02:01 2015 +0100 +++ b/hws/hw02.tex Mon Sep 28 23:17:35 2015 +0100 @@ -1,7 +1,4 @@ \documentclass{article} -%\usepackage{charter} -%\usepackage{hyperref} -%\usepackage{amssymb} \usepackage{../style} \begin{document} diff -r 770b58a7d754 -r 9019f84ef99c hws/hw03.pdf Binary file hws/hw03.pdf has changed diff -r 770b58a7d754 -r 9019f84ef99c hws/hw03.tex --- a/hws/hw03.tex Mon Sep 28 21:02:01 2015 +0100 +++ b/hws/hw03.tex Mon Sep 28 23:17:35 2015 +0100 @@ -1,17 +1,21 @@ \documentclass{article} -\usepackage{charter} -\usepackage{hyperref} +\usepackage{../style} + \begin{document} \section*{Homework 3} +\HEADER + \begin{enumerate} \item What should the architecture of a network application under Unix be that processes potentially hostile data? -\item How can you exploit the fact that every night root has a cron - job that deletes the files in \texttt{/tmp}? (Hint: cron-attack) +\item What is a unikernel system and why is a unikernel +preferable on a web server system (in contrast to a traditional +general purpose operating system like Linux). + \item How does a buffer-overflow attack work? (Hint: What happens on the stack.) @@ -25,8 +29,8 @@ \item How does a stack canary help with preventing a buffer-overflow attack? -\item Why does randomising the address where programs are run help - defending against buffer overflow attacks? +\item Why does randomising the addresses from where programs + are run help defending against buffer overflow attacks? \item Assume format string attacks allow you to read out the stack. What can you do with this information? (Hint: Consider what diff -r 770b58a7d754 -r 9019f84ef99c hws/hw04.pdf Binary file hws/hw04.pdf has changed diff -r 770b58a7d754 -r 9019f84ef99c hws/hw04.tex --- a/hws/hw04.tex Mon Sep 28 21:02:01 2015 +0100 +++ b/hws/hw04.tex Mon Sep 28 23:17:35 2015 +0100 @@ -8,6 +8,10 @@ \begin{enumerate} \item What does the principle of least privilege say? +\item How can you exploit the fact that every night root has a cron + job that deletes the files in \texttt{/tmp}? (Hint: cron-attack) + + \item In which of the following situations can the access control mechanism of Unix file permissions be used?