Homework #4

Due: March 14, 2023
Points: 100


Questions

  1. (30 points) Consider again the algorithm in Figure 9–7. The power used is another side channel for most instantiations of this algorithm. Explain how this side channel works. How might you add sufficient noise to it to render it unusable?

  2. (20 points) Let L = (SL, ≤L) be a lattice. Define:
    1. SIL = { [a, b] | a, bSLaL b }
    2. IL = { ([a1, b1], [a2, b2]) | a1L a2b1L b2 }
    3. lubIL([a1, b1], [a2, b2]) = (lubL(a1, a2), lubL(b1, b2))
    4. glbIL([a1, b1], [a2, b2]) = (glbL(a1, a2), glbL(b1, b2))
    Prove that the structure IL = (SIL, ≤IL) is a lattice.

  3. (30 points) The following system call adds read permission for a process (for_pid) if the caller (call_pid) owns the file, and does nothing otherwise. (The operating system supplies call_ pid; the caller supplies the two latter parameters.)
    
    function addread(call_pid, for_pid: process_id; fid: file_id): integer;
    begin
    	if (call_pid = filelist[fid].owner) then
    		addright(filelist[fid].access_control_list, for_pid, "r");
    	result := (call_pid - filelist[fid].owner);
    	return result
    end.
    
    1. Is the variable result directly or indirectly visible, or not visible?
    2. Is the variable filelist[fid].owner directly or indirectly visible, or not visible?
    3. Is the variable filelist[fid].access_control directly or indirectly visible, or not visible?

  4. (20 points) Definition 19–2 defines assurance in terms of “confidence.” A vendor advertises that its system was connected to the Internet for three months, and no one was able to break into it. It claims that this means that the system cannot be broken into from any network.
    1. Do you share the vendor’s confidence? Why or why not?
    2. If a commercial evaluation service had monitored the testing of this system and confirmed that, despite numerous attempts, no attacker had succeeded in breaking into it, would your confidence in the vendor’s claim be increased, decreased, or left unchanged? Justify your answer.

UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 235B, Foundations of Computer and Information Security
Version of February 28, 2023 at 9:21AM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh