# HG changeset patch # User Christian Urban # Date 1349156640 -3600 # Node ID ba6999806deefd21a8dbb5f67f5a5dcbb4ffc2b4 # Parent d627d9bc15c86b9b5ed7f36677edc36c7982051a tuned diff -r d627d9bc15c8 -r ba6999806dee slides02.pdf Binary file slides02.pdf has changed diff -r d627d9bc15c8 -r ba6999806dee slides02.tex --- a/slides02.tex Tue Oct 02 06:39:11 2012 +0100 +++ b/slides02.tex Tue Oct 02 06:44:00 2012 +0100 @@ -363,6 +363,21 @@ \end{frame}} %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% +\mode{ +\begin{frame}[c] +\frametitle{\begin{tabular}{c}Homework\end{tabular}} + +\begin{itemize} +\item Assume format string attacks allow you to read out the stack. What can you do + with this information.\bigskip + +\item Assume you can crash a program remotely. Why is this a problem? +\end{itemize} + +\end{frame}} +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + \end{document}