updated hws
authorChristian Urban <christian dot urban at kcl dot ac dot uk>
Mon, 28 Sep 2015 23:17:35 +0100
changeset 389 9019f84ef99c
parent 388 770b58a7d754
child 390 92a8dad2cc86
updated hws
hws/hw02.pdf
hws/hw02.tex
hws/hw03.pdf
hws/hw03.tex
hws/hw04.pdf
hws/hw04.tex
Binary file hws/hw02.pdf has changed
--- a/hws/hw02.tex	Mon Sep 28 21:02:01 2015 +0100
+++ b/hws/hw02.tex	Mon Sep 28 23:17:35 2015 +0100
@@ -1,7 +1,4 @@
 \documentclass{article}
-%\usepackage{charter}
-%\usepackage{hyperref}
-%\usepackage{amssymb}
 \usepackage{../style}
 
 \begin{document}
Binary file hws/hw03.pdf has changed
--- a/hws/hw03.tex	Mon Sep 28 21:02:01 2015 +0100
+++ b/hws/hw03.tex	Mon Sep 28 23:17:35 2015 +0100
@@ -1,17 +1,21 @@
 \documentclass{article}
-\usepackage{charter}
-\usepackage{hyperref}
+\usepackage{../style}
+
 
 \begin{document}
 
 \section*{Homework 3}
 
+\HEADER
+
 \begin{enumerate}
 \item What should the architecture of a network application under Unix
   be that processes potentially hostile data?
 
-\item How can you exploit the fact that every night root has a cron
-  job that deletes the files in \texttt{/tmp}? (Hint: cron-attack)
+\item What is a unikernel system and why is a unikernel
+preferable on a web server system (in contrast to a traditional
+general purpose operating system like Linux).
+
 
 \item How does a buffer-overflow attack work? (Hint: What happens on
   the stack.)
@@ -25,8 +29,8 @@
 \item How does a stack canary help with preventing a buffer-overflow
   attack?
 
-\item Why does randomising the address where programs are run help
-  defending against buffer overflow attacks?
+\item Why does randomising the addresses from where programs 
+  are run help defending against buffer overflow attacks?
 
 \item Assume format string attacks allow you to read out the
   stack. What can you do with this information? (Hint: Consider what
Binary file hws/hw04.pdf has changed
--- a/hws/hw04.tex	Mon Sep 28 21:02:01 2015 +0100
+++ b/hws/hw04.tex	Mon Sep 28 23:17:35 2015 +0100
@@ -8,6 +8,10 @@
 \begin{enumerate}
 \item What does the principle of least privilege say?
 
+\item How can you exploit the fact that every night root has a cron
+  job that deletes the files in \texttt{/tmp}? (Hint: cron-attack)
+
+
 \item In which of the following situations can the access control mechanism of Unix
 file permissions be used?