计算机代考程序代写 scheme x86 Peyrin & S 161 Summer 2020 Computer Security – cscodehelp代写

Peyrin & S 161 Summer 2020 Computer Security
Midterm
For questions with circular bubbles, you may select exactly one choice on the answer sheet. Unselected option
Only one selected option
For questions with square checkboxes, you may select one or more choices on the answer sheet.
You can select
multiple squares
For questions with a large box, you need write and label your answer in the blank space below the question on the answer sheet.
You have 110 minutes. There are 5 questions of varying credit (150 points total).
The exam is open note. You can use an unlimited number of handwritten cheat sheets, but you must work alone.
Clarifications will be posted at https://cs161.org/clarifications.
MANDATORY – Honor Code (1 point)
Read the following honor code and sign your name on your answer sheet. Failure to do so will result in a grade of 0 for this exam.
I understand that I may not collaborate with anyone else on this exam, or cheat in any way. I am aware of the Berkeley Campus Code of Student Conduct and acknowledge that academic misconduct will be reported to the Center for Student Conduct and may further result in partial or complete loss of credit.
Page 1 of 15

Q1 True/false (34 points) Each true/false is worth 2 points. This question has 17 subparts.
Q1.1 TrueorFalse:Ifthediscrete-logproblemisbroken(someonefindsawaytoefficientlycalculate 𝑎 given 𝑔𝑎 mod 𝑝), ElGamal encryption is no longer secure.
True False
Q1.2 True or False: Buffer overflows can occur on the stack and heap, but not in the static section of C memory.
True False
Q1.3 True or False: The primary danger of format string vulnerabilities is that they let an attacker write more bytes into a buffer than the buffer has space for.
True False
Q1.4 True or False: You create a Reddit bot but leave your secret credentials file in your public GitHub repo. You believe this is not a problem because attackers won’t look at your Github repo. This is a failure to consider Shannon’s Maxim.
True False
Q1.5 TrueorFalse:IfASLRisenabled,leakingtheaddressofastackvariablewouldgiveanattacker the address of heap variables.
True False
Q1.6 True or False: All cryptographic hash functions are one-to-one functions. True False
Q1.7 True or False: Alice downloads a certificate for TikTok over a channel that is using encryption based on AES-ECB. She can always verify the validity of the certificate, assuming she has a validated copy of the parent certificate.
True False
Q1.8 True or False: Combining two independent detectors in parallel (alert when either detector alerts) is always more effective than combining them in serial (alert when both detectors alert).
True False
Q1.9 Alice and Bob are communicating through RSA encryption, and both parties are attaching digital signatures to their messages. Alice and Bob each have a public encryption key, a private decryption key, a public verifying key, and a private signature key.
True or False: If Eve acquires access to both Alice and Bob’s private signature keys, the communication channel is no longer confidential.
Midterm Page 2 of 15 CS 161 – Summer 2020

True False
Q1.10 TrueorFalse:Acompanyrequiresuserstohavelong,complicatedpasswords.Asaresult,some employees write down their passwords on sticky notes to remember them. This is an example of not following the “Security is Economics” security principle.
True False
Q1.11 True or False: If 𝑘 is a 128 bit key selected uniformly at random, then it is impossible to distin- guish AES𝑘 (⋅) from a permutation selected uniformly at random from the set of all permutations over 128-bit strings.
Clarification made during the exam: AES𝑘(⋅) refers to the encryption function of AES using key 𝑘. True False
Q1.12 True or False: Enabling stack canaries, ASLR, and DEP prevents all buffer overflow attacks. True False
Q1.13 True or False: Coding in a memory-safe language prevents all buffer overflow attacks. True False
Q1.14 True or False: To use ElGamal encryption efficiently on very long messages, you should break up the message into small blocks and encrypt each block individually with ElGamal.
True False
Q1.15 TrueorFalse:Ahashfunctionthatisone-waybutnotcollisionresistancecanbesecurelyused for password hashing.
True False
Q1.16 True or False: A hash function whose output always ends in 0 regardless of the input can’t be collision resistant.
True False
Q1.17 True or False: Compared to the trusted directories model, digital certificates are less dependent on a central point of availability.
True False
This is the end of Q1. Proceed to Q2 on your answer sheet.
Midterm Page 3 of 15 CS 161 – Summer 2020

Q2 Asymmetric (29 points) This question has 7 subparts.
Q2.1 (5 points) In Diffie-Hellman key exchange, which of the following elements would be known to an attacker observing network traffic between Alice and Bob? Assume the same syntax from notes and lecture, and Alice has a SK = 𝑎. Select all that apply.
(A)𝑔 (C)𝑎mod𝑝 (E)𝑔𝑎 mod𝑎
(B)𝑝 (D)𝑔 mod𝑝 (F)Noneoftheabove
Q2.2 (5 points) Consider the un-padded ElGamal encryption scheme as shown in lecture. Alice sends the number 10, but a man-in-the-middle attacker intercepts the message. If Alice sends out the encrypted message (𝑅, 𝑆), write an expression for a modified message that would cause Bob to receive the number 20.
Please clearly label your final answer on your answer sheet.
Bob is tired of having his email hacked, so he devises a personal encryption method for students to send him messages. Define 𝑔 and 𝑝 the same way they are defined in ElGamal. Assume that there are 𝑝 students, each with a unique SID in the range [0, 𝑝 − 1].
Just like in ElGamal, Bob generates a secret key 𝑏, and a public key 𝐵 = 𝑔𝑏 (mod 𝑝). Students with a valid student ID (𝑠𝑖𝑑) will encrypt their plaintext message 𝑚 and send (𝑅, 𝑆), where 𝑅 = 𝑔𝑠𝑖𝑑 mod 𝑝 and 𝑆=(𝑚×𝐵)𝑠𝑖𝑑 mod𝑝.
Q2.3 (5 points) Assume Bob is expecting a message from a student with SID 𝑠𝑖𝑑. Write an expression for 𝑚 in terms of 𝑝,𝑏,𝑅,𝑆, and 𝑠𝑖𝑑.
Please clearly label your final answer on your answer sheet.
Q2.4 (3 points) be able to decrypt a message from someone he is not expecting in polynomial time?
(G) Yes, because Bob can try every 𝑠𝑖𝑑 in polynomial time
(H) Yes, because the decryption does not require Bob to know 𝑠𝑖𝑑 (I) No, because the discrete-log problem is hard
(J) No, because the factoring problem is hard
(K) None of the above
(L)
Midterm
Page 4 of 15
CS 161 – Summer 2020

Q2.5 (3 points) True or False: The same attack from Q2.2 will succeed under this new schema.
Clarification made during the exam: Subpart 5 is asking if the exact expression you wrote in subpart 2 will have the same effect on the modified scheme.
(A) True (B) False (C) (D) (E) (F)
Q2.6 (5 points) Suppose Alice is sending Bob your grade (𝑅, 𝑆), and you know Alice’s 𝑠𝑖𝑑. You have the ability to launch a man-in-the-middle attack. Write an expression for a modified message that would change your grade to be 10 times your original grade.
Please clearly label your final answer on your answer sheet.
Q2.7 (3 points) Assuming that the recipient knows the 𝑠𝑖𝑑 used, what does this scheme provide? Select all that apply.
(A) Integrity (C) Confidentiality (E)
(B) Authentication (D) None of the above
(F)
This is the end of Q2. Proceed to Q3 on your answer sheet.
Midterm Page 5 of 15 CS 161 – Summer 2020

Q3 IV-e got a question for ya (24 points) Determine whether each of the following schemes is IND-CPA secure. This question has 6 subparts.
Q3.1 (6 points) AES-CBC where the IV for message 𝑀 is chosen as HMAC-SHA256(𝑘2, 𝑀) truncated to the first 128 bits. The MAC key 𝑘2 is distinct from the encryption key 𝑘1.
Provide a short justification for your answer on your answer sheet.
(A) Insecure (C) (E)
(B) Secure (D)
(F)
Q3.2 (6 points) AES-CTR where the IV for message 𝑀 is chosen as HMAC-SHA256(𝑘2, 𝑀) truncated to the first 128 bits. The MAC key 𝑘2 is distinct from the encryption key 𝑘1.
Provide a short justification for your answer on your answer sheet.
Clarification made during the exam: You can assume that IV refers to the nonce for CTR mode.
(G) Insecure (I) (K)
(H) Secure (J)
(L)
Q3.3 (3 points) AES-CBC where the IV for message 𝑀 is chosen as SHA-256(𝑥) truncated to the first 128 bits. 𝑥 is a predictable counter starting at 0 and incremented per message.
(A) Insecure (C) (E)
(F)
128 bits. 𝑥 is a predictable counter starting at 0 and incremented per message.
Clarification made during the exam: You can assume that IV refers to the nonce for CTR mode.
(G) Insecure (I) (K)
(B) Secure (D)
Q3.4 (3 points) AES-CTR where the IV for message 𝑀 is chosen as SHA-256(𝑥) truncated to the first
(H) Secure (J)
(L)
Q3.5 (3 points) AES-CBC where the IV for message 𝑀 is chosen as HMAC-SHA256(𝑘2 + 𝑥, 𝑀) truncated to the first 128 bits. The MAC key 𝑘2 is distinct from the encryption key 𝑘1 and 𝑥 is a predictable counter starting at 0 and incremented per message.
Midterm Page 6 of 15 CS 161 – Summer 2020

(A) Insecure (C) (E)
(B) Secure (D)
(F)
Q3.6 (3points)AES-CTRwheretheIVformessage𝑀ischosenasHMAC-SHA256(𝑘2+𝑥,𝑀)truncated to the first 128 bits. The MAC key 𝑘2 is distinct from the encryption key 𝑘1 and 𝑥 is a predictable counter starting at 0 and incremented per message.
Clarification made during the exam: You can assume that IV refers to the nonce for CTR mode. (G) Insecure (I) (K)
(H) Secure (J)
(L)
This is the end of Q3. Proceed to Q4 on your answer sheet.
Midterm Page 7 of 15
CS 161 – Summer 2020

Q4 steg (27 points) This question has 9 subparts.
Consider a new C function, steg(char *s). It is similar to gets, but instead of writing to higher memory addresses, steg stores the user input by writing to lower memory addresses, starting at the memory address pointed to by s.
For example, if I call steg(str) and &str = 0xdeadbeef, and I type in xyz as input, the byte x will be stored at 0xdeadbeef, the byte y will be stored at 0xdeadbeee, and the byte z will be stored at 0xdeadbeed.
Consider the following vulnerable C code that uses steg:
1 2 3 4 5 6 7 8 9
void display(char ∗buf) { steg ( buf ) ;
printf(“%s”, buf);
}
int main() {
char door [4]; display(&door) ;
}
(3 points) Fill in the numbered blanks for this incomplete stack diagram. Each box in the diagram represents 4 bytes. Each blank is worth 3 points.
Q4.1 Blank (1) (A) door
(B) buf = &door Q4.2 Blank (2)
(G) door
(H) buf = &door
rip of main sfp of main (1)
(2)
(3)
sfp of display
(C) rip of display (E)
Midterm
Page 8 of 15
CS 161 – Summer 2020
(D)
(F)
(I) rip of display (K)
(J)
(L)

Q4.3 Blank (3)
(A) door (C) rip of display (E)
(F)
Remember that the rip of a function f refers to the EIP of the previous function that is pushed onto the stack when calling f.
(G) display (I) None of the above (K)
(L)
We find the address of door to be 0xbfffff1c. Complete the exploit in the following three parts to cause the shellcode to execute.
Hint: x86 is little-endian (ie. the least significant byte of a word is stored at the lowest address), and we are writing from higher addresses to lower addresses.
Hint: 0xbfffff1c – 16 = 0xbfffff0c, and 0xbfffff1c – 8 = 0xbfffff14.
Q4.5 (3 points) At the call to steg at line 2, first input this many bytes of garbage to reach the rip:
(B) buf = &door (D)
Q4.4 (3 points) Which rip is vulnerable to being changed during the call to steg?
(H) main (J)
Suppose we have an 8-byte shellcode. Denote REV_SHELLCODE as a reversed version of this shellcode.
(A) 0 (B) 1 (C) 5
Q4.6 (3 points) Then overwrite the rip with these bytes:
(G) xbfxffxffx0c (H) x0cxffxffxbf (I) xbfxffxffx14
Q4.7 (3 points) Then input these bytes: (A) xbfxffxffx0c
(B) x0cxffxffxbf (C) xbfxffxffx14
(D) 9 (E) 13 (F) 17
( J) x14xffxffxbf (K) REV_SHELLCODE (L)
(D) x14xffxffxbf (E) REV_SHELLCODE
(F)
Q4.8 (3 points) Would the exploit from the previous parts still work if stack canaries were enabled? Assume there is no way for the attacker to learn the value of the stack canary.
Midterm Page 9 of 15 CS 161 – Summer 2020

(G) Yes (H) No (I) (J) (K) (L)
Q4.9 (3 points) What is the length (in bytes) of the longest shellcode that can be executed using the exploit in the previous parts without triggering a stack canary? Assume there is no way for the attacker to learn the value of the stack canary.
Please clearly label your final answer on your answer sheet.
This is the end of Q4. Proceed to Q5 on your answer sheet.
Midterm Page 10 of 15 CS 161 – Summer 2020

Q5 A Dangerous Game (35 points) This question has 9 subparts.
Note: This is the hardest question on the exam. We recommend trying the other questions on the exam before this one.
A new online game, HackMe, splits 128-512 players into groups of 16 and has all groups compete to hack each other. HackMe uses a hash table to create groups and store info about each player.
Recall that a hash table is an array of “buckets” (here each bucket is a linked list). To add a player to the table, a hash function is evaluated to decide which bucket the player goes into, and they are appended to the linked list of that bucket.
1 2 3 4 5 6 7 8 9
10
11
12
13
14
15
16
17
18
19
20
21
Q5.1 (3 points) Assume that hash() outputs an unsigned integer equal to the last 4 bits of a pseudoran- dom, cryptographic hash function. If the table contains a number of Players with random ids, what do you expect about the size of the buckets?
(A) They will all roughly be the same size
(B) The 0th bucket will be larger than the 1st bucket (C) The 1st bucket will be larger than the 0th bucket (D)
(E)
(F)
typedef struct Player { int id;
int hacking_ability ; } Player ;
typedef struct Bucket {
int8_t size ; // 8 bit signed integer
LinkedList ∗b; // Pointer to a linked list implementation
} Bucket ;
typedef struct HashTable {
int players ;
Bucket buckets [16]; } HashTable ;
void add_player(HashTable ∗t , Player p) {
size_t idx = hash(p.id + t−>players); // hash range is [0, 16)
append(t−>buckets[idx ].b, p) ; // appends p to LinkedList t−>buckets[idx ]. size += 1;
t−>players += 1;
}
Midterm
Page 11 of 15
CS 161 – Summer 2020

Q5.2 (3 points) Assume that hash() outputs an unsigned integer equal to the last 4 bits of a pseudoran- dom, cryptographic hash function. If the table contains a number of Players with the same id, what do you expect about the size of the buckets?
(G) They will all roughly be the same size
(H) The 0th bucket will be larger than the 1st bucket
(I) The 1st bucket will be larger than the 0th bucket
(J)
(K)
(L)
Q5.3 (3 points) Say a user stores a large number (ie. 10000) of Players in a HashTable. Which of the following would occur given the code above?
(A) Integer overflow (C) Off-by-one (E)
(B) Buffer overflow (D)
(F)
Q5.4 (3 points) Which line number contains the vulnerability from the previous part? (G) Line 7 (I) Line 13 (K)
(H) Line 8 (J)
(L)
To register a group for playing HackMe, one inputs a list of Players to the following function which adds all Players to a HashTable, assigns the group to a server based on size of the 0th bucket, and sets a group name.
1 2 3 4 5 6 7 8 9
10 11 12 13
void register_group ( Player ∗ players , size_t num_players ) {
char ∗server_names[128] = { /∗ Contains 128 server names ∗/ };
char ∗a_gift = 0xffffd528; // Pointer to the stack canary char group_name [ 1 6 ] ;
HashTable group ;
for (int i = 0; i < num_players; i++) { add_player(&group , players [ i ]) ; } printf("Use server: %s ", server_names[group.buckets[0].size]); printf("Please provide 16 character group name: "); gets ( group_name ) ; ... } Midterm Page 12 of 15 CS 161 – Summer 2020 Q5.5 (5 points) Consider line 9: printf("Use server: %s ", server_names[group.buckets[0].size]); Which valid values of group.buckets[0].size would cause this statement to print something outside of server_names? ______ ≤ group.buckets[0].size ≤ ______ Please clearly label your final answer on your answer sheet. Q5.6 (10 points) Mallory challenges you to hack HackMe. Assume you can invoke register_group with a list of Player’s of your choosing, but the list must have length between [128, 512] and num_players must always be correct. HackMe uses a 32-bit x86 system with stack canaries enabled (assume that canaries don’t contain null bytes) but no WˆX bit or ASLR. In order to help you out, Mallory has added a pointer to the stack canary: a_gift. Describe the list of Players you input. Assume that hash() is a publicly-known function that you can query before making your list. Clarification made during the exam: a_gift is a pointer to the stack canary of the register_group frame. Clarification made during the exam: Your answer to subpart 6 should give you information to complete the exploit in subpart 7. (G) (H) (I) ( J) (K) (L) If you need more space on your answer sheet, you can write on a blank sheet of paper and attach it with your submission. Q5.7 (5 points) Write down your exact input to the gets call at line 11. Assume that SHELLCODE holds 64-byte shellcode, GARBAGE is an arbitrary byte, and OUTPUT is the output from the print statement at line 9. Youcanwriteconstantsusinghex(e.g.,0xFFor0xA02200FC).Forinstance,4*GARBAGE + OUTPUT[:1] + SHELLCODE would represent four irrelevant bytes, followed by the first byte of the print result, followed by the 64-byte shellcode. Midterm Page 13 of 15 CS 161 – Summer 2020 Midterm Page 14 of 15 CS 161 – Summer 2020 (A) (B) (C) (D) (E) (F) Q5.8 (3 points) Which of the following could prevent this attack? Assume a_gift always correct points to the stack canary. (G) ASLR (H) 𝑊 ∧ 𝑋 protection (NX bit) (I) Increasing the size of server_names to 256 (J) None of the above (K) (L) This is the end of Q5. You have reached the end of the exam. Midterm Page 15 of 15 CS 161 – Summer 2020

Leave a Reply

Your email address will not be published. Required fields are marked *