Homework: Homework is
due typewritten
(include source code, but not executable files)
by class starting time on the due date.
Each assigned problem requires a solution
and an explanation (or work) detailing
how you arrived at your solution.
Cite any outside sources used to solve a problem.
When grading an assignment,
I may ask for additional information.
A subset of the assigned problems
will be graded.
Zip your homework into a file named hmk.zip.
Email your work to CS166.section1.SJSU@gmail.com
or CS166.section2.SJSU@gmail.com
(depending on your section).
The subject line of your email must be of the form:
CS166HMK assignmentnumber yourlastname last4digitofyourstudentnumber
That is, the subject line must consist of four identifiers.
There is no space within an identifier and each identifier
is separated by a space.
- Assignment 1: Due Thursday, January 31
Chapter 1, problems 2, 9, 13, 15, 17. The problems for Chapter 1 can
be found
here.
Also, read and briefly comment on each of these recent articles:
- Assignment 2: Due Thursday, February 7
Chapter 2, Problems 2, 6, 11, 12, 15, 22, 24, 26, 28.
Write the program for problem 12 before you solve problem 11, and use your program to help you solve problem 11.
- Assignment 3: Due Thursday, February 14
Chapter 3, Problems 3, 4, 6, 9, 11, 14, 25, 27, 30, 31, 37, 43.
For problem 25, part b., you only need to provide 1 disadvantage.
- Assignment 4: Due Tuesday, February 26
Chapter 4, Problems 1, 2, 6, 10, 15, 20, 25, 29, 30, 32, 37.
See the textbook errata for some additional
information on problem 32 (specifically, see item number 12).
- Assignment 5: Due Tuesday, March 5
Chapter 5, Problems 3, 5, 12, 16, 17, 21, 22, 25, 26, 27, 28, 35, 38, 42, 48. For problem 25, generating the files is part of the assignment, so once you have the files, do not give them to anyone else, or post them online.
- Assignment 6: Due Tuesday, March 19
Chapter 7, Problems 1, 6, 9, 10, 11, 13, 14, 25, 31, 37, 38, 40.
- Assignment 7: Due Thursday, April 4
Chapter 8, Problems 2, 3, 6, 7, 8, 11, 13, 15, 19, 20, 24.
- Assignment 8: Due Tuesday, April 9
Chapter 8, Problems 28, 29, 31, 33. Also, solve the following:
1) Send a spoofed email to stamp@cs.sjsu.edu. Do not identify yourself in the spoofed email. In your submitted solution include the contents of the spoofed email and explain how you sent the email.
2) What are the inherent security strengths and weaknesses of
stateless protocols, as compared to stateful protocols? What are the inherent security strengths and weaknesses of
stateful protocols, as compared to stateless protocols?
3) Discuss in detail an attack involving IP fragmentation.
4) Recall the ARP cache poisoning attack discussed in class. How
can you prevent such an attack? Does your suggested prevention measure
create any potential vulnerability? Why or why not?
5) DNS is essentially a single point of failure for the Internet. Explain why this is the case.
6) Outline a DoS attack that exploits the TCP 3-way handshake.
Discuss possible defenses against such an attack and discuss possible
countermeasures that Trudy could use to circumvent your suggested defenses.
- Assignment 9: Due Tuesday, April 16
Chapter 9, Problems 4, 6, 16, 17, 18, 19, 20, 27, 30, 36.
- Assignment 10: Due Thursday, May 2
Chapter 10, Problems 1, 6, 10, 11, 13.
Chapter 12, Problems 1, 2, 3, 7, 12.
- Assignment 11: Due Monday, May 13
Chapter 10, Problems 15, 18, 21, 25, 27, 35, 38, 40.
Chapter 11, Problems 6, 11, 13, 15, 19, 42, 43.
- Assignment 12: Due Before end of finals
You are required to attend at least one of the masters defenses listed
here.
These will all occur before the end of finals week, and the schedule should be finalized by the last week of class.