Homework: Homework is
due typewritten
(include source code, but not executable files)
by class starting time on the due date.
Each assigned problem requires a solution
and an explanation (or work) detailing
how you arrived at your solution.
Cite any outside sources used to solve a problem.
When grading an assignment,
I may ask for additional information.
A subset of the assigned problems
will be graded.
Zip your homework into a file named hmk.zip.
Email your work to cs166.sjsu@gmail.com.
The subject line of your email must be of the form:
CS166HMK assignmentnumber yourlastname last4digitofyourstudentnumber
That is, the subject line must consist of four identifiers.
There is no space within an identifier and each identifier
is separated by a space.
- Assignment 1: Due Thursday, January 29
Chapter 1, problems 1, 9, 11, 13, 15, 17. The problems for Chapter 1 can
be found
here.
Also, for each of the following, write a one-paragraph summary:
- Assignment 2: Due Thursday, February 5
Chapter 2, problems 2, 5, 8, 9, 12, 15, 19, 22, 26, 28.
Solve problem 12 before attempting problem 9, and use your program from problem 12 to help you solve 9.
- Assignment 3: Due Thursday, February 12
Chapter 3, problems 3, 4, 6, 9, 12, 14, 19, 25, 27, 30, 31, 39a.
- Assignment 4: Due Thursday, February 19
Chapter 4, problems 1, 2, 5, 6, 8, 10, 16, 21, 25, 29, 37.
- Assignment 5: Due Thursday, February 26
Chapter 5, problems 3, 5, 12, 17, 21, 22, 25, 26, 27, 35, 42, 48.
- Assignment 6: Due Thursday, March 12
Chapter 7, problems 6, 9, 10, 11, 13, 24, 26, 29, 32, 37, 38.
- Assignment 7: Due Thursday, March 19
Chapter 8, problems 3, 7, 10, 11, 13, 15, 21, 24, 25.
- Assignment 8: Due Thursday, April 2
1) Send a spoofed email to stamp@cs.sjsu.edu. Do not identify yourself in the spoofed email. In your submitted solution include the contents of the spoofed email and explain how you sent the email.
2) What are the inherent security strengths and weaknesses of
stateless protocols, as compared to stateful protocols? What are the inherent security strengths and weaknesses of
stateful protocols, as compared to stateless protocols?
3) Provide a brief description of the IP "overlapping fragment attack" as discussed, for example, in RFC 1858. How can such an attack be prevented?
4) Recall the ARP cache poisoning attack discussed in class. How
can you prevent such an attack? Does your suggested prevention measure
create any potential vulnerability? Why or why not?
5) Read this report, which discusses a 2007 attack on the DNS root servers. Write a brief summary of the report. In your summary, be sure to mention how the attack packets were successfully filtered.
6) Outline a DoS attack that exploits the TCP 3-way handshake.
Discuss possible defenses against such an attack and discuss possible
countermeasures that Trudy could use to circumvent your suggested defenses.
- Assignment 9: Due Tuesday, April 14
Chapter 9, Problems 4, 6, 16, 17, 18, 19, 20, 27, 30, 36.
- Assignment 10: Due Thursday, April 30
Chapter 10, Problems 1, 10, 12, 15, 16, 24, 27a-d, 32, 35, 37a-c, 38, 41, 42.
- Assignment 11: Due Thursday, May 14
Chapter 11, Problems 6, 11, 13, 15, 19, 30, 34, 42, 43.
Chapter 12, Problems 1, 3, 5, 7, 12 (for problems 3 and 5, you can use any Java reversing tool).
- Assignment 12: Due Thursday, May 14
Attend one of the master's defenses listed here:
http://cs.sjsu.edu/~stamp/defenses/spring15.html. This will count as 10 points towards your homework grade. You can earn 10 points extra credit by attending 2 or more of the presentations.
- Assignment 13: Due TBD