T. Andrew Yang

Email: yang@uhcl.edu

Web: http://cse.uhcl.edu/yang/

Tel.: (281) 283-3835

Last updated:

2/9: lab 2 and lab 3 added

1/19/2022: first posted

 

CSCI 5233

spring 2022


 

Note:
When composing your answers, make sure you give the original author(s) the necessary credits if your answer contains information from sources other than your own brain. J
Refer to http://sce.uhcl.edu/yang/citing.htm if more information is needed about proper citing.



Hands-on Labs 

Note 1: The lab may be completed by an individual person or by a team of two persons. A team can consist of no more than two persons.

Note 2: Each person in a two-person team must submit his/her own copy of the lab.

Note 3: Configure your own desktop or laptop to implement the hands-on labs (by setting up virtual boxes and virtual hosts on it).

Note 4 (Preparation for the hands-on labs): Go over the following documents before starting your hands-on labs.

·        Lab setup

·        Using Wireshark

 

Lab 1

Total: 100 points

1.      (5 pts) Decide whether you want to work on this lab by yourself (i.e., a one-person lab team), or partner with another person in the class (i.e., a two-person team). Indicate your team membership for this lab. NOTE: This task is required of each person, whether he or she is in a one-person or a two-person team.

2.      (5 pts) Visit the class discussion group in the Blackboard. Post a message, in the forum ‘self-intro’, with your full name as the subject line. In your post, briefly introduce yourself, including your full name, your major, and one or two items that you most desire to learn in this class. Throughout this class, you shall regularly participate at the discussion group to find recent announcements, reminders, and discussions. 

3.      Cyber attacks: Explain what each of the following attacks is. Cite your source(s). 

Note: Not all information published on the web are correct. Discern the validity of the information you use by, for example, comparing them with what you have learned from the textbooks and the class discussions.

a)      (10 pts) Replay attacks

b)     (10 pts) Man-in-the-middle attacks

c)      (10 pts) Explain the relationship between replay attacks and Denial of Service (DoS) attacks. Hint: How would the hacker use replay attacks to cause Denial of Service?

d)     (10 pts) Explain the differences between replay attacks and man-in-the-middle attacks. Hint: They are different attacks.

 

4.      To prepare your computer for the remaining hands-on labs, set up your computer according to instructions given at this page: https://seedsecuritylabs.org/lab_env.html

a)      Download and install the virtual box first.

b)     Next, download the SEED Ubuntu16.04 VM image file to a folder in your computer.

c)      Unzip and copy the VM images to a folder.

d)     Configure the virtual box and create a new virtual machine with the same name as your full name (e.g., JohnDoe as the name of the VM).

e)      (10 pts) Print a screenshot of your VM created above (in 6.1.4). Note: Name the VM using your full name. Figure 1 shows a sample screenshot.

Figure 1: Sample screenshot of a VM

Note: As shown in Figure 2, in order to enable shared clipboard between the VM and your computer’s OS, be sure to configure, in Settings/General/Advanced, both ‘Shared Clipboard’ and ‘Drag’n’Drop’ to bidirectional.

Figure 2: VM settings to enable shared clipboard

 

5.      Answer the following questions:

a)        (10 pts) What is a virtual box? Hint: Explain its relationship to the operating system. What is the role played by the virtual box?

b)       (10 pts) What is the role played by the SEED Ubuntu16.04 VM image?

c)        (10 pts) How many VMs can you run simultaneously within a virtual box?

d)       (10 pts) Start the VM created above in 6.1. Click the Terminator icon to activate a terminal window within the VM. Enter the following three commands into the terminal window: whoami, date, ls. Take a screenshot of the terminal window. See Figure 3 for an example screenshot.

Figure 3: Sample screenshot of a terminal window in the virtual box

 

Go to the Index


Lab 2

Total: 100 points

1.      (5 pts) Decide whether you want to work on this lab by yourself (i.e., a one-person lab team), or partner with another person in the class (i.e., a two-person team). Indicate your team membership for this lab. NOTE: This task is required of each person, whether he or she is in a one-person or a two-person team.

 

2.      Complete Tasks #1-#5 from the PKI lab (https://seedsecuritylabs.org/Labs_16.04/Crypto/Crypto_PKI/).

-        Evaluation of the lab: You will earn 20% for having successfully implemented each of the tasks.

-        Task #6 is a bonus (10% extra).

-        To hand in: a well-documented lab report including screen shots and explanations

 

Go to the Index


Lab 3

Total: 100 points

1.      (5 pts) Decide whether you want to work on this lab by yourself (i.e., a one-person lab team), or partner with another person in the class (i.e., a two-person team). Indicate your team membership for this lab. NOTE: This task is required of each person, whether he or she is in a one-person or a two-person team.

2.      Complete Tasks #1-#5 from the Buffer Overflow lab (https://seedsecuritylabs.org/Labs_16.04/Software/Buffer_Overflow/).

-        Evaluation of the lab: You will earn 20% for having successfully implemented each of the tasks.

-        Task #6 is a bonus (10% extra).

-        To hand in: a well-documented lab report including screen shots and explanations

 

Go to the Index


Research Project & Presentations

Note 1: This is an individual project.

Note 2: Make sure you properly cite the work of other researchers or professionals. Visit http://sce.uhcl.edu/yang/citing.htm for more information about cited references. Warning: Missing or improper cited references in your abstract and final report will result in poor score for your research project.

 

The goal of this project is for you to visit refereed publications (as well as some relevant web sites) to perform a detailed investigation of a chosen research topic. The University Library has online databases that could be used as a starting point of your literature search.

The topic you choose should be related to Cryptography and/or Software Security.  Do not select a broad topic such as Wi-Fi security or cloud security; instead, choose a topic that is related to certain cryptographical algorithm or a protocol/standard in Software Security. Visit https://en.wikipedia.org/wiki/List_of_cryptosystems to view a list of cryptosystems. If you need suggestions when choosing the topic, feel free to discuss it with the instructor.

 

Items to be submitted:

 

  1. The abstract & literature survey

A preliminary abstract of your presentation topic is due early in the semester. Check the syllabus for the due date. Each student should also present his/her abstract in class on the scheduled date.

The abstract should be 1-2 pages long (single-spaced), and contains the following sections:

(1)    Class name (i.e., CSCI5233 Computer Security & Cryptography)

(2)    Your name and an email address that you check regularly (that is, at least once a day)

(3)    Topic of your investigation

(4)    General description of the topic

(5)    Why have you chosen this topic, that is, its relationship to this course?

(6)    Survey of related work: Discuss at least three articles related to your chosen topic.

(7)    A tentative outline (agenda) of your final report. That is, the sections/subsections that you plan to include in the final paper.

 

  1. The draft final report: A draft of the final report should be before your making the oral presentation.

 

  1. (During the last three weeks) Make a 15-20 minutes of oral presentation of your completed project. Use the CSE Oral Communication Rubric when making the oral presentations.

 

  1. The final written report

1.      The written report should be 5-10 pages long (single-spaced), and include your findings about the chosen topic.

2.      The following is a suggested outline of your final report:

                                          i.     Title

                                         ii.     Your name (and email address)

                                       iii.     An abstract (50-100 words)

                                       iv.     Introduction to the topic

                                         v.     Significance of the chosen topic with respect to this course

                                       vi.     Survey of related work

                                      vii.     Implemented demonstrations, if applicable

                                    viii.     Your findings

                                       ix.     Future work: research ideas and projects related to the topic

                                         x.     Conclusion

                                       xi.     Appendix (if any)

 

Go to the Index