DOC PREVIEW
Berkeley COMPSCI 161 - CS 161 Midterm

This preview shows page 1-2 out of 6 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

CS 161 Computer SecurityFall 2006 Joseph/Tygar Midterm 3PRINT your name:,(last) (first)SIGN your name:PRINT your Unix account name:PRINT your TA’s name:READ ALL INSTRUCTIONS CAREFULLY.You are allowed to bring one 8.5”×11” page of handwritten notes with you, but no books, printouts, orother study aids. Calculators, computers, and other electronic devices are not permitted. Please turn off cellphones and music players and keep them off your desk, and remove headphones.Write your answers in the spaces provided in the test; in particular, we will not grade anything on the backof an exam page unless we are clearly told on the front of the page to look there.Please explain all work, but be concise.If you think there is an error in the exam, please bring it to the attention of the exam proctor. If you find aquestion to be ambiguous, choose the most likely interpretation and state your interpretation explicitly.You have 80 minutes. There are four questions, of varying credit (100 points total). The questions are ofvarying difficulty, so avoid spending too long on any one question.Do not turn this page until your proctor tells you to do so.Problem 1Problem 2Problem 3Problem 4TotalCS 161, Fall 2006, Midterm 3 1Problem 1. [Auctions] (20 points)This question will consider different types of auctions. For each auction type, we will ask you to describehow it works, and then to describe whether it ever makes sense for a bidder to bid less than his or her actualvaluation (that is, the amount he or she considers to be a fair price for the item being sold.) Of course, thebidder wants to achieve the lowest price possible. Here is an example:(x) How does a sealed bid auction work? Does it ever make sense for a bidder to bid less than the actualvaluation?A: In a sealed bid auction, each of the bidders sends a sealed, secret bid to the auctioneer,that only the auctioneer can read. The auctioneer sells the item to the highest bidder at theprice bid. In some cases, it makes sense to bid less that the actual valuation; if a biddersuspects she will be the highest bidder, then she should only bid slightly more than what sheexpects the second highest-bid to be: in that way, she can save substantial money.Answer the following (maximum 4 sentences each):(a) (10 points) How does a Dutch auction work? Does it ever make sense for a bidder to bid less than hisor her actual valuation?(b) (10 points) How does a second price ”Vickrey” auction work? Does it ever make sense for a bidder tobid less than his or her actual valuation?CS 161, Fall 2006, Midterm 3 2Problem 2. [Attacks] (24 points)Consider the Berkeley CalNet Authentication Web Server, which uses a web page with a user name anduser password (the password must be between 9 and 255 characters, and must contain at least three of thefollowing: uppercase letters, lowercase letters, numbers, punctuation, and all other characters), connectedvia SSL to net-auth.berkeley.edu.Give at least 3 different plausible ways to attack such a system and gain unauthorized access (1-3 sentenceseach). (8 points each)CS 161, Fall 2006, Midterm 3 3Problem 3. [Short answer] (30 points)Give a 1-2 sentence answer for each question. (6 points each)1. Why is having a non-executable stack and heap insufficient to protect against buffer overflow codeexecution attacks?2. Firewalls can be used to block all distributed denial of service attacks while allowing all authorizedcommunications. True or false, and why?3. How can a targeted worm or virus avoid detection by a virus scanner? Give the most relevant answer.4. Joe wants to protect himself against rootkits, so he runs a virtual Windows XP system on top ofMac OS X. Is Joe vulnerable to Windows XP rootkits? Why or why not?5. In a Mandatory Access Control system, how can an insider with access to a high-security file leakinformation to a low-security process using the virtual memory system? What is this type of attackcalled?CS 161, Fall 2006, Midterm 3 4Problem 4. [E-Voting] (26 points)Your task is to help the State of California develop certification standards for electronic voting machines(DREs).For each of the three phases of electronic voting at a polling place, give the necessary preconditions andpostconditions for a DRE to preserve the integrity of the vote. Assume that there are several multiplecandidate races, each race has only one winner, and voters may vote for at most one candidate per race(voters may chose to leave any race blank).Here are the three phases you will consider:1. Machine preparation on Election day (before polling starts)2. Accepting a cast vote (repeated throughout election day)3. Finalization after the polls closeYou do not need to consider transparency, privacy, or secrecy for this problem. Please limit yourself toconditions necessary for integrity. State your conditions clearly and precisely, and you shouldn’t needadditional explanation.(a) (8 points) The first phase is preparation of the machine on election day before polling begins.Preconditions:Postconditions:CS 161, Fall 2006, Midterm 3 5(b) (10 points) The second phase is casting of each vote. Specify the preconditions before a vote is cast andthe postconditions after a vote is cast.Preconditions:Postconditions:(c) (8 points) The final phase is finalization of vote totals at the end of election day after the polls close.Preconditions:Postconditions:CS 161, Fall 2006, Midterm 3


View Full Document

Berkeley COMPSCI 161 - CS 161 Midterm

Documents in this Course
Rootkits

Rootkits

11 pages

Load more
Download CS 161 Midterm
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view CS 161 Midterm and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view CS 161 Midterm 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?