ISA 563: Fundamentals of Systems Programming

Spring 2010
Muhammad Abdulla
General Information | Textbooks | Schedule & Notes | Projects | Policies
Sample Code

Sample Attack Programs

  The attacker program should behave like a normal driver program that
  excercise program functionalities, except that it should put more focus on
  revealing possible security holes, or any other areas that affect program
  reliability. 

  The attack could be through any channel that accepts, implicitly or
  explicitly, an input: standard input (or any other file), command line
  arguments, pipes, environment variables, network sockets, etc.  Below are
  some examples.

  Attack Through Standard Input
     Makefile
     program.c
     attacker.c

     How to run:
        $ make
        $ ./attacker | ./program

  Attack Through Command Line Arguments
     Makefile
     program.c
     attacker.c

     How to run:
        $ make
        $ ./attacker

Date & Time
bullet
bullet (EST)
What is New?
Valid W3C XHTML
© 2008-2010 Muhammad Abdulla
Last Modified: January 27, 2010