Data for the xlock program were collected
on a machine running Linux.
Use the original Linux mapping file for these
traces.
There are 71 synthetic traces, from a script
designed to exercise many of xlock's command line options.
There is also a single live trace collected over
one weekend. (weekend starting 8/29/97)
Be warned - this file includes approximately 16 million system calls!
The exploit used here is a buffer overflow of one of the command
line options.
CERT advisory
We have two sample traces (7/24/97 - 7/25/97)
of this exploit.