Sample Midterm Exam

  1. Here is a fragment of code from a program that reads data from a file into a dynamically allocated part of memory. There are at least 3 things in this code that make it very non-robust. Find any 3, say why each is a (potential) problem, and how you would fix each. (This question asks about robustness, not commenting style - the comments are just there to help you figure out what is going on.)
    /* read nchars characters from the file named filename */
    /* and put them into dynamically allocated memory      */
    char *load(int nchars, char *filename)
    {
    	char *p;	/* pointer to allocated memory */
    	FILE *fp;	/* pointer to the opened file */
     
    	/* allocate space for nchars char */
    	p = malloc(nchars * sizeof(char));
    	/* open the file */
    	fp = fopen(filename, "r");
    	/* read nchars characters from the file that   */
    	/* fp points to, and put it in the memory that */
    	/* begins at address p                         */
    	(void) fread(p, sizeof(char), nchars, fp);
    	/* close the file */
    	(void) fclose(fp);
    	/* return the address of the allocated memory */
    	return(p);
    }
    
  2. Why is a precise statement of security requirements critical to the determination of whether a given system is secure?
  3. Consider the Bell-LaPadula multilevel security model. If a subject with security label (L, C) can read an object with security label (L', C'), then (L, C) is said to dominate (L', C'). Prove that this dominates relation is reflexive, antisymmetric, and transitive.
  4. Define each of the following terms in one short sentence:
    1. public key cryptosystem
    2. challenge-response
    3. ciphertext
    4. end-to-end encryption
    5. principle of fail-safe defaults
  5. System vendors often add security features to strengthen the security of their systems. These additions are not designed into the system, but rather are added after the system has been shipped. Discuss whether adding security features to a large, complex operating system not designed with security in mind (such as the UNIX operating system or Windows 95) violates any of Saltzer's and Schroeder's design principles. (Go through all 8 design principles.)


Here is a PDF version of this document.