Rice University logo
 
Top blue bar image Comp327: Introduction to Computer Security
Blog and homepage for Rice's Comp327
 

HW 6: Exploiting the bad code

HW 6: Exploiting the bad code is now assigned.  Before you get started, there are a couple of points:
1)  This is the first time this assignment has been used, so please make sure you email the TA if you have problems getting started or you get stuck on a problem.
2)  Everyone must work in a group of 2 or more, no exceptions.
3)  The required environment for this assignment is a 32-bit Linux system.
4)  Please read the instructions carefully before emailing the TA.
5) Do not hesitate to ask for guidance.

Comments are closed.