This preview shows page 1. Sign up to view the full content.
Unformatted text preview: e continue to ﬁnd security leaks in systems that leave them vulnerable to buffer overﬂow attacks. This highlights the need for careful programming. Any interface to the external environment should be made “bullet proof” so that no behavior by an external agent can cause the system to misbehave.
Aside: Worms and viruses Both worms and viruses are pieces of code that attempt to spread themselves among computers. As described by Spafford , a worm is a program that can run by itself and can propagate a fully working version of itself to other machines. A virus is a piece of code that adds itself to other programs, including operating systems. It cannot run independently. In the popular press, the term “virus” is used to refer to a variety of different strategies for spreading attacking code among systems, and so you will hear people saying “virus” for what more properly should be called a “worm.” End Aside. In Problem 3.38, you can gain ﬁrst-hand experience at mounting a buffer overﬂow attack. Note that we do not condone using t...
View Full Document
- Spring '10
- The American