Sample Final Exam Questions
415.725SC Software Security
Clark Thomborson
Computer Science Department, University of Auckland
18 September, 2000
Instructions: This exam will not be graded. Write your answers on a separate sheet. Do not write your name on your answer sheet. If you turn in an answer sheet to me at the end of this class period, I may use one or more of your answers in a class discussion.
A. Legal,
Ethical and Conceptual Frameworks
1) Consider the three goals of security, defined in Pfleeger’s book: confidentiality, integrity, availability. Also consider his classification of assets: hardware, software, data.
Which of Pfleeger’s security goals, for which of Pfleeger’s asset classes, are protected by the following clause of the Computer Science Department’s Computer Systems Regulations of 17 September 1999:
“No person shall … use a login name other than the one(s) assigned to that person by the Department or allow any other person to use that person’s login name(s) to access one of the Department’s computer systems without the express permission of the Director of that system.”
Explain your answer briefly (in approximately 50 words).
B. Cryptographic Authentication, e-Commerce, and Secure Communication
2) The first step in Aucsmith’s “Identity Verification Protocol” is F0 = ( HA == K1A[ K-1A[ HA ] ] ). In this formula, the variables have the following definitions:
· HA is a hash value computed over the code of module A,
· K-1A is a private key of the Integrity Verification Kernel (IVK) embedded in module A,
· K1A is a public key of the IVK embedded in module A,
· F0 is a flag value indicating the success or failure of an operation, and
· K-1A[ HA ] is the signature of module A under A’s private key. This value was computed at compile-time and is stored in some secret fashion within module A.
Which of the following phrases best describes this step in Aucsmith’s IVP?
a) A verifies self
b) A challenges E
c) F verifies self
d) E responds to A
e) E verifies A
f) A checks response
3) Briefly explain (in approximately 50 words) the individual calculations or function evaluations made during the first step in Aucsmith’s IVP.
C. Protection of Hosts
4) Briefly describe one assumption about computer system security, which is valid for non-mobile systems, but is violated for mobile code systems.
D. Copy Detection
5)
Consider
the following images.
Figure 1. Checkerboard.
Figure 2. Copyright Notice.
Sketch the image that would result if the
Checkerboard (Figure 1) is watermarked with the Copyright Notice (Figure 2),
using the least-significant bit embedding described in the paper by Johnson and
Jojodia.
6)
Characterise the watermarked image you
constructed in your answer to the previous question, in terms of its fidelity,
robustness, and security. Use the
definitions of Matheson et al. for these terms.
E. Copy Prevention
7) Consider the following assertion: “Any secrets carried in Java bytecode written today, could be easily attacked tomorrow by a reverse engineer who has access to the decompiler described by Proebsting and Watterson.” Make a brief argument for, or against, this assertion.