Understanding Vulnerabilities 1: C, ASM, and Overflows: Computer Security Lectures 2014/15 S2