Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1) Suppose a C/C++ program has been stripped of its debugging symbols before shi

ID: 3583819 • Letter: 1

Question

1) Suppose a C/C++ program has been stripped of its debugging symbols before shipment. What will happen when an analyst attempts to attach a debugger to the program during reverse engineering?

The analyst will only be able to use the debugger’s breakpoint-by-name functionality on calls to shared library functions

The analyst will not be able to set any breakpoints at all

The analyst will be unable to see the contents of the registers

The analyst will still be able to set hardware breakpoints, but not software breakpoints

The debugger will refuse to attach to the program due to the missing debug symbols

2)

Check off each of the values that must be kept secret in order for a cryptosystem to maintain its security.

           ___    the pad bytes

           ___    the mode the programmer has selected for encryption

           ___    the private key

           ___    the seed used to initialize the random generator used to produce keys

           ___    the initialization vector

           ___    the public key

           ___     the symmetric key

___     the specific cipher (AES, RC4, DES, etc.) that the programmer has selected for performing encryption

3) Suppose a computer program auto-updates itself over an HTTP connection. The software is distributed through a set of mirror sites and HTTPS is not feasible. The software company wishes to prevent the autoupdate feature from downloading a modified or Trojan horse update from a malicious or compromised mirror site. Which technology could provide this security with the smallest performance trade-off? Assume the key distribution problem is solved. a. a symmetric block cipher, such as AES

an digital signature, such as RSA

a symmetric stream cipher, such as RC4

a hash function, such as SHA-3

a message authentication code, such as HMAC-SHA256

5) How long must a key be in order to be twice as difficult to break as a 128-bit AES key?

_________________________________________________________________________

6)

Which prevents JavaScript code successfully injected by an attacker into a page on amazon.com from reading the session cookie for amazon.com? a. the certificate authority

the Secure flag

the P3P privacy policy

the HttpOnly flag

the same origin policy

Explanation / Answer

1) Suppose a C/C++ program has been stripped of its debugging symbols before shipment. What will happen when an analyst attempts to attach a debugger to the program during reverse engineering?
Answer: The analyst will still be able to set hardware breakpoints, but not software breakpoints. Because software breakpoints is not easily understandable if you are not the designer or developer of that perticular software.

2) Check off each of the values that must be kept secret in order for a cryptosystem to maintain its security.
Yes the pad bytes
No the mode the programmer has selected for encryption
Yes the private key
Yes the initialization vector
No the public key
Yes the symmetric key
       No the specific cipher (AES, RC4, DES, etc.) that the programmer has selected for performing encryption


3) Suppose a computer program auto-updates itself over an HTTP connection. The software is distributed through a set of mirror sites and HTTPS is not feasible. The software company wishes to prevent the autoupdate feature from downloading a modified or Trojan horse update from a malicious or compromised mirror site. Which technology could provide this security with the smallest performance trade-off? Assume the key distribution problem is solved. a. a symmetric block cipher, such as AES

Answer: an digital signature, such as RSA. An digital signature estublishes source authenticity of any data or software.

5) How long must a key be in order to be twice as difficult to break as a 128-bit AES key?
Answer: 129-bit key. Because with increase of each bit the number of key combinations get doubled in number.

6)
Which prevents JavaScript code successfully injected by an attacker into a page on amazon.com from reading the session cookie for amazon.com? a. the certificate Answer: the HttpOnly flag. Setting this flag ensures there is no local read allowed.