Difference: ComputerScience415 (1 vs. 2)

Revision 22006-12-27 - TWikiGuest

Line: 1 to 1
 
META TOPICPARENT name="DonaldActon"
Deleted:
<
<
 

Some Links and Ideas for CPSC 415

Assignment Ideas

Changed:
<
<
  • [[http://isis.poly.edu/courses/cs392/labs/HW8.pdf][Buffer Exploit]
  • [[http://www.ccs.neu.edu/home/noubir/Courses/CSG254/S06/Labs/LA1/la1.html][Simple overflow exploit]
>
>
 
  • Consider an assignment where the app has a large buffer on the stack and it is copied into from a command line option -- make the size on the stack different based on who is compiling and running the code

Revision 12006-08-03 - TWikiGuest

Line: 1 to 1
Added:
>
>
META TOPICPARENT name="DonaldActon"

Some Links and Ideas for CPSC 415

Assignment Ideas

  • [[http://isis.poly.edu/courses/cs392/labs/HW8.pdf][Buffer Exploit]
  • [[http://www.ccs.neu.edu/home/noubir/Courses/CSG254/S06/Labs/LA1/la1.html][Simple overflow exploit]
  • Consider an assignment where the app has a large buffer on the stack and it is copied into from a command line option -- make the size on the stack different based on who is compiling and running the code
  • have them exploit a subroutine and explain what would happen if that was in the kernel
 
This site is powered by the TWiki collaboration platform Powered by PerlCopyright © 2008-2025 by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback