hws/hw04.tex
changeset 122 f0e51ffd2965
parent 117 59d3bf386a6d
child 239 0db764174afb
equal deleted inserted replaced
121:01f7e799e6ce 122:f0e51ffd2965
     8 \section*{Homework 4}
     8 \section*{Homework 4}
     9 
     9 
    10 \begin{enumerate}
    10 \begin{enumerate}
    11 \item Explain what is meant by \emph{Kerckhoffs' principle}.
    11 \item Explain what is meant by \emph{Kerckhoffs' principle}.
    12 
    12 
       
    13 \item How can a system that separates between \emph{users} and \emph{root} be of any 
       
    14 help with buffer overflow attacks?
       
    15 
       
    16 \item Consider the following simple mutual authentication protocol:
       
    17 
       
    18 \begin{center}
       
    19 \begin{tabular}{ll}
       
    20 $A \rightarrow B$: & $N_a$\\  
       
    21 $B \rightarrow A$: & $\{N_a, N_b\}_{K_{ab}}$\\
       
    22 $A \rightarrow B$: & $N_b$\\
       
    23 \end{tabular}
       
    24 \end{center}
       
    25 
       
    26 Explain how an attacker $B'$ can launch an impersonation attack by 
       
    27 intercepting all messages for $B$ and make $A$ decrypt her own challenges.
       
    28 
       
    29 \item Explain what are the differences between dictionary and brute forcing attacks  against  passwords.
       
    30 
       
    31 \item In the context of which information flow should be protected, explain briefly the 
       
    32 differences between the {\it read rule} of the Bell-LaPadula access
       
    33 policy and the Biba access policy. Do the same for the {\it write rule}.
       
    34 
       
    35 \item A Unix directory might look as follows:
       
    36 
       
    37 \begin{center}
       
    38 \begin{verbatim}
       
    39 $ ls -ld . * */*
       
    40 drwxr-xr-x 1 ping staff  32768 Apr  2 2010 .
       
    41 -rw----r-- 1 ping students  31359 Jul 24 2011 manual.txt
       
    42 -r--rw--w- 1 bob students   4359 Jul 24 2011 report.txt
       
    43 -rwsr--r-x 1 bob students 141359 Jun  1 2013 microedit
       
    44 dr--r-xr-x 1 bob staff  32768 Jul 23 2011 src
       
    45 -rw-r--r-- 1 bob staff  81359 Feb 28 2012 src/code.c
       
    46 -r--rw---- 1 emma students    959 Jan 23 2012 src/code.h
       
    47 \end{verbatim}
       
    48 \end{center}
       
    49 
       
    50 with group memberships assigned as follows:
       
    51 \begin{center}
       
    52 \begin{tabular}{ll}
       
    53 Members of group staff: & ping, bob, emma\\ 
       
    54 Members of group students: & emma\\
       
    55 \end{tabular}
       
    56 \end{center}
       
    57 
       
    58 The file microedit is a text editor, which allows its users to open, edit and 
       
    59 save files. Note carefully that microedit has set its setuid flag. 
       
    60 Fill in the access control matrix below that shows for each of the above five files, 
       
    61 whether ping, bob, or emma are able to obtain the right to read (R) or replace (W) its 
       
    62 contents using the editor microedit.\bigskip
       
    63 
       
    64 \begin{center}
       
    65 \begin{tabular}{r|c|c|c|c|c}
       
    66         & manual.txt & report.txt & microedit & src/code.c & src/code.h \\\hline
       
    67 ping & & & & &\\\hline
       
    68 bob & & & & &\\\hline
       
    69 emma   & & & & &\\
       
    70 \end{tabular}
       
    71 \end{center}
       
    72 
    13 
    73 
    14 \end{enumerate}
    74 \end{enumerate}
    15 
    75 
    16 
    76 
    17 \end{document}
    77 \end{document}