Changes between Version 104 and Version 105 of EducationalAssignments/SecurityLayerPartOne

Changes between Version 104 and Version 105 of EducationalAssignments/SecurityLayerPartOne

Please note that these Trac pages are no longer being updated. Wiki contents/documentation have moved to GitHub.

Changes between Version 104 and Version 105 of EducationalAssignments/SecurityLayerPartOne

Please note that these Trac pages are no longer being updated. Wiki contents/documentation have moved to GitHub.

Changes between Version 104 and Version 105 of EducationalAssignments/SecurityLayerPartOne

Show
Ignore:
Timestamp:
05/23/12 07:28:19 (7 years ago)
Author:
ericms
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • EducationalAssignments/SecurityLayerPartOne

    v104 v105  
    180180=== Testing your security layer === 
    181181---- 
    182 In this part of the assignment you will pretend to be an attacker.  Remember the attackers objective is to write "MZ" to a file.  By understanding how the attacker thinks, you will be able to write better security layers.  Perhaps while attacking your security layer you will think of a new mitigation that should have been implemented.  Keep in mind attacks are attempts to mitigate a given security protocol.  If even one case succeeds, then your security layer has been compromised.  Thus the attack you write should include several methods of attempting to write "MZ" to a file.  An example of an attack is found below: 
     182In this part of the assignment you will pretend to be an attacker.  Remember the attacker's objective is to write "MZ" to a file.  By understanding how the attacker thinks, you will be able to write better security layers.  Perhaps while attacking your security layer you will think of a new mitigation that should have been implemented.  Keep in mind attacks are attempts to mitigate a given security protocol.  If even one case succeeds, then your security layer has been compromised.  Thus the attack you write should include several methods of attempting to write "MZ" to a file.  An example of an attack is found below: 
    183183 
    184184{{{ 
     
    225225{{{python repy.py restrictions.default encasementlib.repy [security_layer].repy [attack_program].repy }}} 
    226226 
    227 Make sure you went through the "How to get RepyV2" section or this won't work! 
     227Make sure you went through the "How to get RepyV2" section! 
    228228[[BR]] 
    229229= Notes and Resources = 
     
    255255= Extra Credit = 
    256256---- 
    257 For extra credit, make a second reference monitor which stops an attacker from writing 'p0wnd' anywhere in a file.  You should also test the security layer by trying to write 'p0wnd' anywhere in the file.   
     257For extra credit, make a second security layer which stops an attacker from writing 'p0wnd' anywhere in a file.  This security layer will be similar to the first one you wrote, except now you must handle the case of `offset != 0` as well as a few other things.  You should also write an attack layer which attempts to write 'p0wnd' to a file.   
    258258 
    259259'''Hint:''' Since this string can be written anywhere in the file, there will most likely be more test cases.