Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revision Both sides next revision
cs-465:exam-2 [2015/12/01 13:37]
fred
cs-465:exam-2 [2017/04/12 07:52]
fred
Line 1: Line 1:
 '''​Exam 2'''​ '''​Exam 2'''​
  
-Date: Tues Dec 8th+
  
 Location: In Class Location: In Class
Line 9: Line 9:
 Study the lecture slides available on the web site, and other readings Study the lecture slides available on the web site, and other readings
  
-MAC and HMAC (abstract definitions and also specific examples) +Secure email (example of how we combine symmetric and asymmetric encryption to send an encrypted message).  Understand the theory of how the two common systems we studied work and know the differences between them
- +
-Secure email (example of how we combine symmetric and asymmetric encryption to send an encrypted message)+
  
 TLS Handshake TLS Handshake
- +* know protocol control flow (given a diagram, reason from it)  
-Review Exam 1 problems+* know record format 
 +* know what data is exchanged at what phases and it’s composition. 
 +* <​del>​session resumption and how it works, and why we do it</​del>​ 
 +* be able to explain the parts of a cipher name e.g. TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
  
 Buffer Overflow Attacks Buffer Overflow Attacks
Line 21: Line 22:
 * Canaries * Canaries
 * What is a NOP sled? Why/How is it used? * What is a NOP sled? Why/How is it used?
-* Defenses+* Defenses ​ ​(Prevention,​ and Mitigation, and what the difference between these is) 
 +* Understand x86 stack layout calling conventions as seen in assignments 
 +* Shown some debugger output, be able to reason about the function call 
 +  diagram and the state that the program is in and will be in 
 + 
 + 
 +Binary extraction attacks and the use of a debugger.
  
 Integer Manipulation Vulnerabilities Integer Manipulation Vulnerabilities
Line 31: Line 38:
 * Unix password files - how do they work? * Unix password files - how do they work?
 * Lamport'​s Hash - how does it work? how to attack it? * Lamport'​s Hash - how does it work? how to attack it?
 +* Salts - what and why?
 +
 +Attacks against, and countermeasures for programs that hold passwords
 +
 +<​del>​Command Injection Vulnerabilities,​ prevention and mitigation techniques</​del>​
 +
 +<​del>​Usability as a security problem - be prepared to give examples and explain</​del>​
  
 Ken Thompson compiler hack - how it works Ken Thompson compiler hack - how it works
  
-Principle of Least Privilege+Principle of Least Privilege ​ and how it relates to Defense in Depth 
 + 
 +ANYTHING in any of your projects, or homework assignments.
  
  
Line 42: Line 58:
 * What is it? * What is it?
 * How to defend against it? * How to defend against it?
 +
 +Review Exam 1 problems ​
 +* MAC/HMAC, hashes and how they are implemented,​ and how they are not the same
cs-465/exam-2.txt · Last modified: 2017/12/04 15:38 by seamons
Back to top
CC Attribution-Share Alike 4.0 International
chimeric.de = chi`s home Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0