1 \documentclass{article} |
1 \documentclass{article} |
2 \usepackage{charter} |
2 \usepackage{charter} |
3 \usepackage{hyperref} |
3 \usepackage{hyperref} |
|
4 \usepackage{amssymb} |
4 |
5 |
5 \begin{document} |
6 \begin{document} |
6 |
7 |
7 \section*{Homework 2} |
8 \section*{Homework 2} |
8 |
9 |
9 \begin{enumerate} |
10 \begin{enumerate} |
10 \item Assume format string attacks allow you to read out the stack. What can you do |
11 \item Voice voting is the method of casting a vote in the `open air' for everyone |
11 with this information? (Hint: Consider what is stored in the stack.) |
12 present to hear. Which of the following security requirements do paper ballots |
|
13 satisfy better than voice voting? Check all that apply and give a brief explanation |
|
14 for your decision. |
12 |
15 |
13 \item Assume you can crash a program remotely. Why is this a problem? |
16 \begin{itemize} |
|
17 \item[$\Box$] Integrity\bigskip\bigskip |
|
18 \item[$\Box$] Enfranchisement\bigskip\bigskip |
|
19 \item[$\Box$] Ballot secrecy\bigskip\bigskip |
|
20 \item[$\Box$] Voter authentication\bigskip\bigskip |
|
21 \item[$\Box$] Availability\bigskip\bigskip |
|
22 \end{itemize} |
14 |
23 |
15 \item How can the choice of a programming language help with buffer overflow attacks? |
|
16 (Hint: Why are C-programs prone to such attacks, but not Java programs.) |
|
17 |
24 |
18 \item (Optional) How can a system that separates between \emph{users} and \emph{root} be of any help with buffer overflow attacks? |
25 \item Explain how an attacker can use chain voting in order to influence the outcome of a |
|
26 poll using paper ballots. |
|
27 |
|
28 \item Which of the following mechanisms help with defending against chain voting? Check all |
|
29 that apply. Give a brief reason for each defence that mitigates chain voting attacks. |
|
30 |
|
31 \begin{itemize} |
|
32 \item[$\Box$] Using a glass ballot box to make it clear there are no ballots in the box before the start of the election. |
|
33 \item[$\Box$] Distributing ballots publicly before the election. |
|
34 \item[$\Box$] Checking that a voter's ID (drivers license, passport) matches the voter. |
|
35 \item[$\Box$] Each ballot has a unique ID. When a voter is given a ballot, the ID is recorded. When the voter submits his or her ballot, this ID is checked against the record. |
|
36 \end{itemize} |
|
37 |
|
38 \item What is the main difference between online banking and e-voting? |
|
39 (Hint: Why is the latter so hard to get secure?) |
|
40 |
19 \end{enumerate} |
41 \end{enumerate} |
|
42 |
20 |
43 |
21 \end{document} |
44 \end{document} |
22 |
45 |
23 %%% Local Variables: |
46 %%% Local Variables: |
24 %%% mode: latex |
47 %%% mode: latex |