CS 361S - Network Security and Privacy Spring Homework #3

Similar documents
CS 361S - Network Security and Privacy Spring Homework #1

CS 361S - Network Security and Privacy Spring Homework #2

DO NOT OPEN UNTIL INSTRUCTED

CS 361S - Network Security and Privacy Spring Project #2

CS 361S - Network Security and Privacy Spring Project #2

Exam Advanced Network Security

Fall 2005 Joseph/Tygar/Vazirani/Wagner Final

CS 161 Computer Security

CS 361S - Network Security and Privacy Spring Project #1

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

CS Programming Languages Fall Homework #2

CS 161 Computer Security

Computer Security Fall 2006 Joseph/Tygar MT 3 Solutions

Elements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy

Network Security and Cryptography. December Sample Exam Marking Scheme

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Cryptography Introduction

IT443 Network Security Administration Spring Gabriel Ghinita University of Massachusetts at Boston

Homework 5: Exam Review

INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR Stamp / Signature of the Invigilator

Homework 2: Symmetric Crypto Due at 11:59PM on Monday Feb 23, 2015 as a PDF via websubmit.

Elements of Cryptography and Computer and Network Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy

CS155b: E-Commerce. Lecture 6: Jan. 25, Security and Privacy, Continued

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Computer Security Fall 2006 Joseph/Tygar MT 2 Solutions

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

Homework 1 CS161 Computer Security, Spring 2008 Assigned 2/4/08 Due 2/13/08

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

Final Exam. Course Grade

Distributed Systems. Lecture 14: Security. Distributed Systems 1

CS 155 Final Exam. CS 155: Spring 2005 June 2005

Distributed Systems. Lecture 14: Security. 5 March,

CRYPTOGRAPHIC ENGINEERING ASSIGNMENT II Theoretical: Design Weaknesses in MIFARE Classic

HW/Lab 4: IPSec and Wireless Security. CS 336/536: Computer Network Security DUE 11 am on 12/01/2014 (Monday)

Identification Schemes

cs642 /introduction computer security adam everspaugh

CS Programming Languages Fall Homework #1

Introduction to Security and User Authentication

ISA 564 SECURITY LAB. Introduction & Class Mechanics. Angelos Stavrou, George Mason University

The Salsa20 Family of Stream Ciphers

Crypto meets Web Security: Certificates and SSL/TLS

ENEE 457: Computer Systems Security 8/27/18. Lecture 1 Introduction to Computer Systems Security

Overview of Information Security

SmartSiren: Virus Detection and Alert for Smartphones. Jerry Cheung, Starsky Wong, Hao Yang and Songwu Lu MOBISYS 2007

CS 494/594 Computer and Network Security

Full file at

Cisco IOS Classic Firewall/IPS: Configuring Context Based Access Control (CBAC) for Denial of Service Protection

ISA 564 SECURITY LAB. Introduction & Class Mechanics. Angelos Stavrou, George Mason University

ECE596C: Handout #9. Authentication Using Shared Secrets. Electrical and Computer Engineering, University of Arizona, Loukas Lazos

CS61A Lecture #39: Cryptography

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

CS System Security Mid-Semester Review

CIS 551 / TCOM 401 Computer and Network Security. Spring 2008 Lecture 23

Mobile Security Fall 2012

Operating systems and security - Overview

Operating systems and security - Overview

Cryptography Functions

Security Setup CHAPTER

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

Lecture Note 6 KEY MANAGEMENT. Sourav Mukhopadhyay

CPSC 467: Cryptography and Computer Security

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

CS321: Computer Networks FTP, TELNET, SSH

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

Elements of Cryptography and Computer and Networking Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy

Kerberos V Security: Replay Attacks

User Authentication Protocols Week 7

Wireless Network Security Spring 2016

Exam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)

Lecture 3: Symmetric Key Encryption

Principles of Security Part 4: Authentication protocols Sections 1 and 2

Chapter 9 Public Key Cryptography. WANG YANG

Exclusion-Freeness in Multi-party Exchange Protocols

(2½ hours) Total Marks: 75

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

CS 161 Computer Security

MASSACHUSETTS INSTITUTE OF TECHNOLOGY Fall Quiz II

An Efficient Stream Cipher Using Variable Sizes of Key-Streams

User Authentication Protocols

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

ECA Trusted Agent Handbook

CS 155 Final Exam. CS 155: Spring 2009 June 2009

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Symmetric Cryptography

Network Control, Con t

Authentication and Password CS166 Introduction to Computer Security 2/11/18 CS166 1

Key Management. Digital signatures: classical and public key Classic and Public Key exchange. Handwritten Signature

CS 6903: Modern Cryptography Spring 2011

Summary on Crypto Primitives and Protocols

CS 161 Computer Security

Wireless Network Security Spring 2015

Network Security and Cryptography. 2 September Marking Scheme

Stopping Advanced Persistent Threats In Cloud and DataCenters

CS 161 Computer Security

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Programming Project #1

Cryptography CS 555. Topic 16: Key Management and The Need for Public Key Cryptography. CS555 Spring 2012/Topic 16 1

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

1-7 Attacks on Cryptosystems

Transcription:

CS 361S - Network Security and Privacy Spring 2017 Homework #3 Due: 11am CDT (in class), May 1, 2017 YOUR NAME: Collaboration policy No collaboration is permitted on this assignment. Any cheating (e.g., submitting another person s work as your own, or permitting your work to be copied) will automatically result in a failing grade. The Deparment of Computer Science code of conduct can be found at http://www.cs.utexas.edu/undergraduate-program/code-conduct. Late submission policy This homework is due at the beginning of class on May 1. All late submissions will be subject to the following policy. You start the semester with a credit of 3 late days. For the purpose of counting late days, a day is 24 hours starting at 11am on the assignment s due date. Partial days are rounded up to the next full day. You are free to divide your late days among the take-home assignments (3 homeworks and 2 projects) any way you want: submit three assignments 1 day late, submit one assignment 3 days late, etc. After your 3 days are used up, no late submissions will be accepted and you will automatically receive 0 points for each late assignment. You may submit late assignments to Dillon Caryl, by email or hard copy. If you are submitting late, please indicate how many late days you are using. Write the number of late days you are using: 1

Homework #3: Molvanîa Forever (50 points) Problem 1 (9 points) It is easy to design an application-level gateway (proxy) for the FTP protocol. The proxy decides, for example, whether an outsider should be able to access a particular directory in the file system and issues a corresponding command to the inside file manager or refuses the outsider s request. List three protocols that would be prohibitively difficult or impossible to proxy and explain why. Problem 2 Consider the following UNIX program (written in pseudo-code): networkwrite(); while (..) { networkread(); if (...) fileread(); else filewrite(); if (... fileopen()...)...; else fileread(); fileclose(); } geteuid(); setuid(); In the above code, the system calls made by the program are networkwrite, networkread, fileread, filewrite, fileopen, fileclose, geteuid, and setuid. Their arguments are omitted for simplicity. 2

Problem 2a (3 points) How can system call interposition prevent an attacker from exploiting this program to execute a shell via the exec system call? Problem 2b (8 points) By looking at the program code, you notice that the program can only execute certain sequences of system calls when it is running normally. For example, it never performs a network read or write after calling setuid(). Write a regular expression that captures all legitimate sequences of system calls that this program can make. Your expression should involve concatenation, alternation, and Kleene star over the symbols NW, NR, FR, FW, FO, FC, GU, SU corresponding to the system calls listed above. Problem 2c (4 points) How does system call interposition based on the regular expression you wrote above can help enforce the following policy: the program should never write to the network after reading a file? Give an example of an attack that such a policy might prevent. 3

Problem 3 (10 points) Molvanîan Organization for Security Defense (MOSDef) developed a new intrusion detection system designed to detect rootkits and adware. For the purposes of this problem, assume that the following three possibilities are exhaustive and mutually exclusive: either the host is normal, or rootkit-infected, or adware-infected. After conducting large-scale experiments, MOSDef computed the following accuracy rates for its product: How this host is classified Type of host Rootkit Adware Normal Rootkit 85% 5% 10% Adware 5% 90% 5% Normal 5% 5% 90% For example, when the MOSDef system analyzes a rootkit-infected host, it correctly classifies the host as rootkit-infected with probability 85%, misclassifies it as adware-infected with probability 5%, and misclassifies it as normal with probability 10%. For the purposes of this problem, assume that 1% of all hosts are infected with rootkits, 2% are infected with adware, and the remaining 97% are normal. When the MOSDef system announces that it has detected adware presence, what is the probability that the host is, in fact, normal? Give your calculations. Problem 4 (8 points) Molvanîan Telecom encrypts voice-over-ip datagrams using a stream cipher based on the following pseudo-random generator: The generator is initialized with the key, the first 4 bits of the keystream are discarded, and the rest is used for encryption. 4

Suppose you want to completely recover the key using a known-plaintext attack. How long should your plaintext be? How would the attack proceed (describe all details)? Problem 5 (8 points) The flagship product sold by Molvanîan Telecom (MT) is the jphone 6. The jphone 6 performs no authentication and as such is trivially vulnerable to cloning attacks: the attacker (passive or active) gathers enough information from one or two phone calls to create a clone of the caller s phone. Later on, the attacker uses the clone to impersonate the victim to the cell phone company and make untraceable calls billed to the victim s number, even when the victim s own phone is switched off. Molvanîan Telecom (MT) has since released a new version of its popular jphone, the jphone 6S ( s for secure ). For authentication, it uses the Digital Signature Standard (DSS). Each jphone 6S stores its own DSS private key x and secret random value k. Both are selected at random when the phone is manufactured and burned into tamper-proof readonly memory. The public key corresponding to x is stored in MT s database. When a jphone 6S initiates a call, MT challenges it with a fresh, random challenge C. The phone executes the DSS signing algorithm and responds with sig x (C), i.e., challenge C is digitally signed with the phone s private key. MT verifies the signature using the phone s public key, and, if verification succeeds, completes the call and bills the phone. Is the jphone 6S secure against cloning? Give a detailed explanation. 5