Exam Info

When & Where

The third exam will be held in our regular classroom on Monday, April 22, 2024.

It will take up about half the lecture, starting approximately during the second half of the class period. Please arrive on time and do not plan on coming in just to take the exam. If you arrive after the exam has started, you will not be allowed to take it.

Exam rules

Be sure to arrive on time. If you arrive after the exam starts, you will not be allowed to take it.

This will be a closed book, closed notes exam. Calculators, phones, augmented reality glasses, laptops, and tablets are neither needed nor permitted. If you have these devices, you must turn them off, put them out of sight, and not access them for the duration of the exam.

No other electronic devices are permitted except for hearing aids, pacemakers, electronic nerve stimulators, other implanted medical devices, or electronic watches that function only as timekeeping devices or chronographs.

Bring a couple of pens or pencils with you. Plan to use a pen only if you are supremely confident in not changing your mind about your answers. . Check here for information about pencils, sharpeners, and the craft of pencil sharpening.

Past exams

You can use my past exams as a guide to what this exam may look like, but realize there are differences in topics and in the sequencing of the topics. Expect aroudn 25 multiple-choice questions. I do not refer to old exams when I come up with a new one, so it is likely that many of the topics that I considered important in past exams will show up on future exams. Some material may have changed, however, so do not worry about questions that appear to relate to topics we have not covered.

Get past 419 exams here.

Study guide

You are responsible for the material from the first four lectures and recitations.

I’ve prepared a study guide that attempts to cover most of the material you should know. It is not a substitute for the lectures, lecture material, and other reading matter. All the material may not be in the guide. My goal is to put most of the information you need to know a concise with fewer elaborations. You can also prepare your own guide, which would be a great way to prepare for the exam.

Get the study guide

Topics

Topics that you should know and may be on the exam include:

Virtual Machines

  • Process virtual machine: what is it? How does it differ from a VM?
  • What’s a hypervisor (virtual machine manager)
  • Handling of privileged instructions with VMM in place
  • Native vs. hosted VM
  • Covert channel (side channel attack): what is it?

App Confinement: Application Sandboxing

  • Kernel hooks with user-level validation (e.g., Janus)
    • Hooks
    • Per-process policies
    • User-level validation (e.g., Janus) problems: TOCTTOU, state synchronization
  • Native OS sandboxing
    • Linux Seccomp-BPF
    • system call filters
    • pattern matching
    • You don’t need to know anything about the Apple Sandbox
  • Java sandbox roles of bytecode verifier, class loader, security manager
  • You don’t need to know anything about web sandboxes or the Chromium Native Client

Malware

  • Be familiar with terms: adware, exfiltration, spyware, ransomware, DoS, DDoS, zero-day, social engineering

  • Worm vs. virus

  • Virus components: infection mechanism, packer, dropper, payload, trigger (logic bomb)

  • Infiltration mechanisms

    • Code vulnerabilities, modified compilers, modified USB firmware, …
    • Social engineering
    • Credential stuffing
  • Where malware lives

    • File infector virus
    • Bootloader (or boot sector) virus, bootkits
    • Infected flash drives: AutoRun, hacked firmware (UEFI), and data leakage
    • Macro viruses
    • Trojans
    • Backdoors
    • I will not ask about JavaScript, source repositories
    • Rootkits: user & kernel mode rootkits
      • Hypervisor rootkit: what makes it more dangerous than other rootkits?
    • I will not ask you about the Red Pill (SIDT instruction)
    • I will not ask about Stuxnet
  • Gathering information via malware

    • Phishing, spear phishing
    • Keyloggers
    • Deceptive websites
  • Bots, botnets, command & control servers

  • Defenses

    • file protection (including MAC)
    • warning users
    • Anti-malware software
      • Signature scanning
      • Static heuristic analysis
      • Behavioral analysis
      • Sandboxing
    • Other defenses
      • Removing admin rights from users
      • Containers (but know there are problems)
    • Malware countermeasures: packers, polymorphism, triggers.
    • Understand the lessons of Reflections on Trusting Trust

Network security

  • Basic concepts of local area network (LAN), IP, transport layer, TCP, UDP
  • Link layer
    • What does a CAM overflow attack do?
    • What does a switch spoofing attack (VLAN hopping) do?
    • What is ARP cache poisoning?
    • What is the purpose of ARP? Know the purpose of an ARP response and a gratuitous ARP.
    • How can a system try to defend against ARP cache poisoning?
  • Network layer
    • What is DHCP server spoofing?
    • How does DHCP snooping work?
    • Understand lack of authentication in IP datagrams, source address spoofing
    • Router attacks
  • Transport layer
    • Simplicity of forging UDP packets
    • Understand the need for random TCP starting sequence numbers
    • What is a SYN flooding attack and how can you guard against it?
  • Routing
    • You don’t need to know External BGP vs. Internal BGP or OSPF (that’s background 352 info)
    • What is the security problem with BGP?
    • Path forgery, prefix forgery
    • Purpose of RPKI
    • Purpose of BGPsec
    • Security problem with DNS
    • You don’t need to know about the domain registry, registar, root servers (that’s background 352 info)
    • How does DNS cache poisoning work?
    • How does DNS cache poisoning differ from pharming?
    • Possible defenses against DNS spoofing
    • What is a DNS rebinding attack?

Firewalls & VPNs

  • Now doe Network Address Translation help with security?

  • Virtual Private Networks

    • What is a tunnel?
    • Tunnel mode vs. transport mode
    • IPsec Authentication Heander (AH) protocol
      • Just understand what it authenticates and encrypts
    • IPsec Encapsulating Security Payload (ESP) protocol
      • Just understand what it authenticates and encrypts
    • You don’t need to know the ciphers used by IPsec but know that it uses symmetric cryptography and HMACs. Know that Diffie-Hellman is most commonly used for key exchange.
  • Transport Layer Security (TLS)

    • Goal of SSL/TLS
    • Mutual vs. uni-directional authentication
    • Remember that SSL (Secure Socket Layer) evolved into TLS (just to not be confused between the acronyms)
    • Basic concepts: authentication, key exchange, message integrity, communication.
    • You don’t need to know the ciphers used by TLS but know that authentication is done with public keys and X.509 certificates, key exchange is be done with Diffie-Hellman keys; know that data is encrypted with a symmetric algorithm (usually AES), and data integrity is provided with an HMAC.
      • Know there are handshake and communication phases
    • You don’t need to know how the protocol changed in TLS 1.3
      • You don’t need to know TLS 1.3 key derivation (HKDF) or AEAD
    • You don’t need to know past attacks on TLS
    • Know that client authentication is almost never used. Why?
  • Difference between using VPNs and TLS

  • Firewalls

    • High-level goal of a firewall
    • Approaches: Packet filters (screening routers), application proxies, IDS/IPS
    • Packet filters
      • What does a screening router do?
      • What is a filter chain?
      • You don’t have to know the syntax of rules but should recognize allow/reject rules
      • You don’t have to know any of differences between Windows, OpenBSD, and Linux implementations
      • What is the basic firewalling principle?
      • Why is a default deny model good?
      • How do you guard against spoofed traffic?
      • First-generation vs. second-generation vs. third-generation packet filters
      • What does stateful inspecion add to a packet filter?
      • What is a DMZ (demilitarized zone)?
      • What is deep packet inspection (DPI) and deep content inspection (DCI)?
    • Intrusion Detection/Prevention Systems (IDS/IPS)
      • Understand the three types of systems: protocol-, signature-, and anomaly-based
      • Anomaly vs. misuse detection
      • Problem of false positives
      • Signatures in the context of IDS/IPS
      • Why is anomaly detection difficult?
    • Application proxies
      • What are they?
      • What is a dual-homed host?
      • What is a bastion host?
    • What is deperimiterization and how does the zero-trust model address it?
    • Host-based vs. network firewalls

DDoS Attacks

  • Distributed Denial of Service attack
  • Volumetric vs packet-per-second attack
  • Reflection amplification

Web browser security

  • Understand the increase in browser complexity (don’t memorize the list but understand the issues)
    • JavaScript, DOM allows modification of pages, more communication models, multimedia support
    • Components come from multiple sources
  • Role of iFrames
  • Same-origin policy
    • When are frames considered to have the same origin?
    • What unique resources can an origin access? Cookies, JavaScript namespace, DOM storage, DOM tree
    • I won’t ask you about the MIME sniffing attack
    • What can go cross origin? Images, CSS, JavaScript
    • Cross-Origin Resource Sharing (CORS)
    • What does CORS enable?
  • Cookies
    • When are they sent to the server?
    • Purpose of HttpOnly
    • Purpose of Secure flag
  • Cross-Site Request Forgery (XSRF)
    • How does it work and when is it a problem?
    • How can you defend against it?
  • What is Clickjacking? How can you defend against it?
  • I will not ask you about screen sharing attacks
  • Input sanitization issues
  • What is an SQL injection attack?
  • Cross-Site Scripting (XSS)
    • What is XSS?
    • Whet causes it?
    • Reflected vs. Persistent XSS
    • How do you defend against it?
  • Homograph/homoglyph attacks
  • Using images on the web to track access: tracking (spy) pixels
Last modified April 12, 2024.
recycled pixels