CSCI262SystemSecuritySpring2016 (Wollongong)
CSCI262SystemSecuritySpring2016 (Wollongong)
(Wollongong Campus)
Examination Paper
Spring Session 2016
Part A
1) Examples of each of the main authentication bases are
password, PIN, or secrete for what a subject knows, a
____________________________________________
____________________________________________
card, badge, or device for what a subject has,
biometrics such as fingerprints or retinal
____________________________________________
characteristics for what a subject is,
______________________________and___________ in front of a
particular terminal or in a specific room
____________________________________________for where an
entity is.
________
Part A
2) Two security properties of a cryptographic hash
one-way, that is, it is infeasible to
function are _____________________________
generate the preimage from the hash digest, and
_____________________________________
collision resistance, that is, it is infeasible to have
________________________________________
two different messages with the same hash value.
_________________________________________
Part A
3) “Online” and “offline” attacks differ in that
online require the connection to be active which
__________________________________________
may impose certain restriction while attempting to
__________________________________________
break the password while offline attack have
__________________________________________
unlimited chances to break the password.
___________________________________
Part A
4) Two possible consequences of a buffer overflow
exploitation by attacker to inject malware to
are ______________________________________
cause an attack against availability such as denial
_________________________________________
of service and ___________________________
__________ run some arbitrary code to
modify data (attack data integrity) as well as
_________________________________________
stealing information (attack on data
_____________________________________
confidentiality).
Part A
5) The principle of least privilege is reflected via
a partial order ≤ (generally a reflexive,
_____________________________________
antisymmetric, and transitivity relation), so that for
_________________________________________
every two elements a, b ∈ L there exists a least
_________________________________________
upper bound u ∈ L and _____________________
________________ a greatest lower bound l
∈___
L in a lattice.
SIM-2016-S3-CSCI262-S3b, Slide 22
Part A
7) Each row of the authorization table of Sandhu &
access triplet (Subject, Object,
Samarti contains _________________________
Action). It is also known as the capabilities which is
____________________________________________
from the point of view of the subject’s action on
____________________________________________
_________________
the various objects.
SIM-2015-S4-CSCI262-S3a, Slide 36
Part A
8) Two resources that can be targeted in a DOS attack
network bandwidth (for network) and ______
are _____________________________
memory storage as well as processor capacity (for
__________________________________________
computer).
_________
SIM-2016-S3-CSCI262-S4a, Slide 5
Part A
9) Random seeding a password generator with time
if an attacker knows
alone is a bad idea because _________________
the time, the attacker can use the same time as the
________________________________________
seed to the random generator to regenerate the
________________________________________
same sequence of password.
________________________________________
SIM-2016-S3-CSCI262-S6a, Slide
Part A
11) Spear phishing differs from general phishing in that
Spear phishing is targeting a specific person while
__________________________________________
general phishing is targeting all the people and
__________________________________________
expecting some to be fooled.
_________________________
SIM-2015-S4-CSCI262-S6b, Slide 39
Part A
Error messages
12) Error-based SQL injection uses ________________
thrown by the database server to obtain
_________________________________________
information about the structure of the database.
_________________________________________
SIM-2016-S3-CSCI262-S, Slide
Part A
13) An event being “Not known to be bad” likely refers
to not being on a event description of activities
___________________________
considered to be violating security policies in the
___________________________________
context of _________________________________
Intrusion detection system.
Part A
14) To be stateless meansa_______________________
server has not committed
any resources and is relevant in the context of
_____________
client puzzle connection protocol.
____________________________
Part A
15) A chain of custody provides assurances that
evidences collected during digital forensics are un-
__________________________________________
altered???
_____________________________
SIM-2016-S3-CSCI262-S8c, Slide 13
Part A
16) Units are relevant in digital forensics and logging
because ___________________________________
SIM-2016-S3-CSCI262-S, Slide
Part B – Question 1 …1
1) Describe three distinct types of attacks against password systems.
Briefly discuss appropriate countermeasures against one of those
types of attacks.
SIM-2016-S3-CSCI262-S2a, Slide21
Part B – Question 1 …2
• The three distinct attacks are dictionary attack, brute-force attack and
hybrid attack. A dictionary attack uses a “dictionary” of all known
words and try to find the password. Brute-force attack is trying all the
possible combination of the password until it is correct. Hybrid attack
is combination of brute-force and dictionary attack where we use
dictionary as the basis but take variants on each of the words tested.
We can protect against dictionary attack if we use words that are not
commonly found in the dictionary or random words. Alternatively,
use salt and regularly change the password.
SIM-2016-S3-CSCI262-S2a, Slide21
Part B – Question 2 ...1
2) Describe in detail how the one-time password system of Lamport
works.
One-time password refers to a password that can be used only for
one session or one transaction. Lamport’s one-time password is one
example of such password. Lamport’s one-time password consists of
two parts, the setup and the process as follows:
Setup:
• In the setup process, a user is selecting a password that is secret to
him/her.
• The system will then use this password, together with some value,
say n, generate a sequence of passwords 𝑝1 , 𝑝2 , … 𝑝𝑛 .
Part B – Question 2 ...2
Process:
• A user, let’s say Alice, request for connection to a server.
• The server issues a challenge n;
• The user responds with one-time password which is generated as
ℎ𝑛−1 𝑝𝑎𝑠𝑠𝑤𝑜𝑟𝑑
• The server checks if ℎ ℎ𝑛−1 𝑝𝑎𝑠𝑠𝑤𝑜𝑟𝑑 = ℎ𝑛 𝑝𝑎𝑠𝑠𝑤𝑜𝑟𝑑
• If it matches, then server accepts the communication request. If it
does not, the server rejects the communication request.
• Once the user has been authenticated, the server needs to update its
information.
Part B – Question 2 ...3
Process: (cont…)
• The system will then replace 𝑥𝑛 = ℎ𝑛 𝑝𝑎𝑠𝑠𝑤𝑜𝑟𝑑 with the one-time
password sent by the user’s, that is, 𝑥𝑛−1 = ℎ𝑛−1 𝑝𝑎𝑠𝑠𝑤𝑜𝑟𝑑 .
• The value 𝑛 is replaced by 𝑛 − 1.
• When 𝑛 reaches 0, the system will have run out of passwords in the
hash chain and will have to run a new setup process, with a new base
password.
Part B – Question 2 ...4
• Lamport’s one-time password works because the system define 𝑝𝑖 to
be 𝐻 𝑛−1 𝑝 where H is a hash function known to all, e.g., MD5() in
our Assignment 1. In this way, attacker cannot derive future password
from a past password. For example, after 𝑝6 , which is equals
𝐻 𝑛−6 𝑝 , the attacker can compute 𝐻 𝑝6 , which equals 𝐻 𝑛−5 𝑝 ,
the already used password 𝑝5 . The attacker cannot compute 𝑝7
because 𝑝7 equals 𝐻 𝑛−7 𝑝 , and computing 𝐻 7 𝑝 from 𝐻 6 𝑝
would require the attacker to computer the inverse of 𝐻 or to know
p, but H is a cryptographic hash function.
Part B – Question 3
3) A company has three departments A, B and C, and has determined
that it is appropriate to have two levels of sensitivity, in increasing
order: L and H. Draw a BLP lattice system to represent this scenario.
Part B – Question 4 …1
4) Explain what positive validation of user input is and why positive it
is important, and usually more appropriate than negative validation
of user input. You need to explain what is meant by positive
validation and negative validation. Give examples to support your
argument.
Positive validation concern a situation where we try to distinguish between
authorized and unauthorized entities. A true positive and false positive may be
the result of positive validation. A true positive refers to a situation when we
make a match, and it is correct. A false positive refers to a situation when we
make a match (a positive match) but which is actually not. Positive validation, in
particular, a false positive, of user input is important because it affects the false
acceptance rate.
Part B – Question 4 …2
A false acceptance rate is the proportion of authentication attempts
resulting in false acceptances, which means the number of matches
is accepted which we should not.
𝐸𝑛𝑡𝑟𝑜𝑝𝑦 = 𝑙𝑜𝑔2 𝑁 𝑙
𝑙𝑜𝑔10 10
= 𝑙𝑜𝑔2 106 = 6𝑙𝑜𝑔2 10 = 6 × = 19.93 𝑏𝑖𝑡𝑠
𝑙𝑜𝑔10 2