Sample Final Exam Questions

COMPSCI 725 Software Security

 

Clark Thomborson

Computer Science Department, University of Auckland

1st May, 2001

 

Instructions:  This exam will not be graded.  Write your answers on a separate sheet.  Do not write your name on your answer sheet.  If you turn in an answer sheet to me at the end of this class period, I may use one or more of your answers in a class discussion.

A.  Legal, Ethical and Conceptual Frameworks

1)       Professor Charles W Turner, of IEEE’s Member Conduct Committee, recently wrote, “It is clearly unethical to pursue patent protection while ignoring or denying the existence of prior work elsewhere in the world...”

In approximately 50 words, analyse Professor Turner’s statement in terms of any one of the ethical systems discussed in class:

·         Pfleeger’s “universal, self-evident, natural rules” (right to know, right to privacy, right to fair compensation for work);

·         Sir David Ross’ duties (fidelity, reparation, gratitude, justice, beneficence, nonmaleficence, self-improvement);

·         Christian ethics (Mosaic law, faith, hope, love, charity, Golden Rule);

·         Confucian ethics (Jen, Chun Tzu, Li, Te, Wen);

·         Islamic ethics (economic, social, military, religious).

2)       If an attacker clones a cellphone, and thereby gets access to the cellphone owner’s voicemail inbox, what integrity expectation of the cellphone’s owner could be violated?  Answer in approximately 50 words, being careful to define a specific integrity expectation that could be attacked in this way, and how this integrity expectation could be violated.

B.  Applications of Cryptography

3)       Name, and briefly describe, three applications of PKI.  Your answer should consist of three sentences of the form “PKI can be used for X, which is …” Each sentence should be approximately 15 words in length.

C.  Secure Software Design Techniques

4)       The overall goal of the S.E.E. Mail project is “to facilitate the exchange of email and documents using the Internet” among agencies of the New Zealand Government.  Here is a question/answer pair appearing on a webpage entitled “S.E.E. Mail – Frequently Asked Questions” (http://www.e-government.govt.nz/projects/see/mail6.html):

Why doesn’t S.E.E. Mail encrypt the “To:”, “From:” and “Subject” fields?

S.E.E. Mail products are “Off-The-Shelf” commercial offerings.  They have not been customised.  Accordingly we have had to live with the vendors’ implementations of the S/MIME standard.

a)       One of the articles you read this term used a four-letter acronym, instead of the phrase “‘Off-The-Shelf’ commercial offerings’”.  What was this acronym?

b)       Write a total of approximately 50 words, listing and very briefly explaining two advantages and two disadvantages of the S.E.E. Mail project’s decision to use “‘Off-The-Shelf’ commercial offerings’.

D.  Copy Detection and Prevention

5)       Cox and Linnartz distinguish between “restricted-key” and “unrestricted-key” watermarking.  In “restricted-key” watermarking, a small number of highly trusted receivers can read the watermark.  In “unrestricted-key” watermarking, a very large number of weakly trusted receivers can read the watermark.  For the case of recorded media such as music, both types of watermarking are important.  Restricted-key watermarks could be discovered by trusted agents of a media company, who monitor broadcasts (on radio, television and the web) for copyright and licensing infringements using special receivers.

In approximately 50 words, explain the purpose and operation of an unrestricted-key watermarking system that is implemented in contemporary DVD players.