Unformatted text preview:

Massachusetts Institute of Technology Handout 126.857: Network and Computer Security April 16, 2008Professor Ronald L. Rivest and Professor Shafi Goldwasser Due: April 30, 2008Problem Set 5This problem set is due via email, to [email protected] on Wednesday, April 30 by the beginning of class.You are to work on this problem set in groups of three or four people. Problems turned in by individuals,pairs, pentuples, etc. will not be accepted. Be sure that all group membe rs can explain the solutions. SeeHandout 1 (Course Information) for our policy on collaboration. If you do not have a group, let us know.Homework must be submitted electronically! Each problem answer must appear on a separate page. Markthe top of each page with your group member names, the course number (6.857), the problem set numberand question, and the date. We have provided templates for LATEX and Microsoft Word on the course website(see the Resources page).Grading and Late Policy: Each problem is worth 3 points. Late homework will not be acceptedwithout prior approval.With the authors’ permission, we will distribute our favorite solution to each problem as the “official”solution—this is your chance to become famous! If you do not wish for your homework to be used as anofficial solution, or if you wish that it only be use d anonymously, please note this on your homework.Problem 5-1. BotnetsRead the Honeynet Project’s whitepaper “Know Your Enemy: Tracking Botnets,” which is linked from theclass website.Supp ose you are the Chief Technical Officer of iKnow Bot, Inc., which provides services to combat the scourgeof botnets.(a) The whitepap e r lists ten common uses of botnets. Describe a different potential application of botnetsthat would be useful (to their operators) today or possibly in the near future. Look especially forapplications that have the potential to be profitable in some direct or indirect way.(b) Explain how, via a partnership with a DNS provider like dyndns.org, it would be possible to preventany new infected hosts from joining many existing botnets.(c) Through some clever detective work, you discover the operator password for a large botnet. Explainhow it would be technically possible to disinfect all zombie machines in the botnet and patch any oftheir security vulnerabilities that might otherwise lead to further infection. Then, discuss the ethicalissues of taking such action. Refer to concrete ethical guidelines, such as those in the ACM Code ofEthics. (See http://www.acm.org/constitution/code.html.)Problem 5-2. Zero Knowledge and Side-Channel AttacksConsider a smart card whose public key is (n, e, y), such that (n, e) is an RSA public-key and y is a randomelement in Z∗n. The private key of the smart card is x such that y = xemod n.Whenever the smart card needs random numbers, it generates them using a pseudo random generator whichstarts with a random seed S stored on the card. The card also has its own battery. When the battery isdisconnected, the current state of the smart card is lost, and it restarts from scratch. The values (n, e, x, S)are stored in non-volatile memory, which do es not require battery power to be maintained.(a) Design a zero-knowledge protocol for the smart-card to prove to the server that it knows an x suchthat y = xemod n such that the probability of success for a cheater (who does not know x) is lessthan 1/100.(b) For your protocol, what happens when an attacker has temporary access to the smart card and can,for example, disconnect the battery?2 6.857 : Handout 12: Problem Set 5(c) It is the year 2100, and it has be en discovered that factoring is easy and so is computing discrete log-arithms. Luckily, another function f has been proven to be one-way (namely, impossible to efficientlyinvert but easy to compute in polynomial time). Design a ze ro-knowledge authentication protocolusing this new function. (Hint: All you need to know here is that proving that a graph is 3-colorableis NP-complete).Problem 5-3. XSSCookies are used to keep state information (http is stateless) and sometimes even used to automatically login(whenever you click “remember me”). In this problem you will try to exploit a vulnerability and use it tosteal a cookie.Go to http://courses.csail.mit.edu/6.857/vulnerable.php (please do not try this on other pages. . . ).This is a very secure login page for you to access your pset 4 grades.(a) Give two reasons why this page is actually very insecure, and justify briefly. One of the security holesshould help you later. (Do not use automated tools against the page.)(b) Now suppose that you are a user of the page located at http://courses.csail.mit.edu/6.857/cookie.html. This page stores some sensitive information about you in a cookie. For simplicity thispage actually allows you to set the “data” field of your c ookie to some value (just click on the “SetCookie” button). The “Get Cookie!” link is there for you to check. You might need to enable cookiesin your brow se r.Set “data” to some value, and check that it has been correctly stored.(c) Leverage the security hole(s) in vulnerable.php to steal the cookie, passing it to some other site(say your web.mit page). Explain your method of attack. Why doesn’t the same origin policy applyto prevent the steal? Are there some fields in the cookies that you can set to stop this attack?(d) If a similar vulnerability was found on a web forum, how could you leverage that to steal cookies?Will you need to trick the user into say clicking a link that you crafted?Problem 5-4. Work on Your


View Full Document

MIT 6 857 - Problem Set 5

Documents in this Course
Load more
Download Problem Set 5
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Problem Set 5 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Problem Set 5 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?