From f37ac16382d9d17f6430586c3c2056bde6b937d6 Mon Sep 17 00:00:00 2001 From: Valentin Brandl Date: Tue, 29 Oct 2019 11:18:38 +0100 Subject: [PATCH] Add comment --- work/01paper.pdf | Bin 70204 -> 70204 bytes work/01paper.tex | 2 ++ 2 files changed, 2 insertions(+) diff --git a/work/01paper.pdf b/work/01paper.pdf index 4bf8ced53a820e187d51bd22bccc150a9410ee25..5a7e72dde0f9067305b2ef1e2cda03fead22ecb8 100644 GIT binary patch delta 104 zcmdn9gk{eXmWC~iy*$hoM&{Ee@GvTX7~41VFrH#|wsbQvGcz+Vv@|euG&VFfayE1{ cFm`e>aC0+svUD`Jv{SGlq-6U60md3e0K>H!a{vGU delta 104 zcmdn9gk{eXmWC~iy*$i@MuyWT@GvTX7~41VFrH#|b~dswG&VCgHZn1AGcb2CF*9>= cG&XZ`ax*hAGq-Rxwo|Ynq-6U60md3e0KSA8X#fBK diff --git a/work/01paper.tex b/work/01paper.tex index 320e2c8..6f139db 100644 --- a/work/01paper.tex +++ b/work/01paper.tex @@ -81,6 +81,8 @@ vulnerabilities or at least application crashes. \subsection{Background}\label{ref:background} +% TODO: many references + \subsubsection{Technical Details} Exploitation of buffer overflow vulnerabilities almost always works by