hws/hw02.tex
changeset 109 b71ce151aba8
parent 97 efcac3016613
child 185 f10d905e947f
equal deleted inserted replaced
108:c3b8432718ed 109:b71ce151aba8
     1 \documentclass{article}
     1 \documentclass{article}
     2 \usepackage{charter}
     2 \usepackage{charter}
     3 \usepackage{hyperref}
     3 \usepackage{hyperref}
       
     4 \usepackage{amssymb}
     4 
     5 
     5 \begin{document}
     6 \begin{document}
     6 
     7 
     7 \section*{Homework 2}
     8 \section*{Homework 2}
     8 
     9 
     9 \begin{enumerate}
    10 \begin{enumerate}
    10 \item Assume format string attacks allow you to read out the stack. What can you do
    11 \item Voice voting is the method of casting a vote in the `open air' for everyone
    11 	with this information? (Hint: Consider what is stored in the stack.)
    12 present to hear. Which of the following security requirements do paper ballots 
       
    13 satisfy better than voice voting? Check all that apply and give a brief explanation 
       
    14 for your decision.
    12 
    15 
    13 \item Assume you can crash a program remotely. Why is this a problem?
    16 \begin{itemize}
       
    17 \item[$\Box$] Integrity\bigskip\bigskip
       
    18 \item[$\Box$] Enfranchisement\bigskip\bigskip
       
    19 \item[$\Box$] Ballot secrecy\bigskip\bigskip
       
    20 \item[$\Box$] Voter authentication\bigskip\bigskip
       
    21 \item[$\Box$] Availability\bigskip\bigskip
       
    22 \end{itemize}
    14 
    23 
    15 \item How can the choice of a programming language help with buffer overflow attacks?
       
    16 (Hint: Why are C-programs prone to such attacks, but not Java programs.)
       
    17 
    24 
    18 \item (Optional) How can a system that separates between \emph{users} and \emph{root} be of any help with buffer overflow attacks?
    25 \item Explain how an attacker can use chain voting in order to influence the outcome of a 
       
    26 poll using paper ballots. 
       
    27 
       
    28 \item Which of the following mechanisms help with defending against chain voting? Check all 
       
    29 that apply. Give a brief reason for each defence that mitigates chain voting attacks.
       
    30 
       
    31 \begin{itemize}
       
    32 \item[$\Box$] Using a glass ballot box to make it clear there are no ballots in the box before the start of the election.
       
    33 \item[$\Box$] Distributing ballots publicly before the election.
       
    34 \item[$\Box$] Checking that a voter's ID (drivers license, passport) matches the voter.
       
    35 \item[$\Box$] Each ballot has a unique ID. When a voter is given a ballot, the ID is recorded. When the voter submits his or her ballot, this ID is checked against the record.
       
    36 \end{itemize}
       
    37 
       
    38 \item What is the main difference between online banking and e-voting? 
       
    39 (Hint: Why is the latter so hard to get secure?)
       
    40 
    19 \end{enumerate}
    41 \end{enumerate}
       
    42 
    20 
    43 
    21 \end{document}
    44 \end{document}
    22 
    45 
    23 %%% Local Variables: 
    46 %%% Local Variables: 
    24 %%% mode: latex
    47 %%% mode: latex