Skip to content

RiceComp427/comp427-hw1-paranoia-jli6

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

15 Commits
 
 

Repository files navigation

Comp427, Spring 2018, Homework 1

Rational Paranoia

The homework specifications, as well as the corresponding course slide decks, can be found on the Comp427 Piazza. This assignment is due Thursday, January 17 at 6 p.m.

You will do this homework by editing the README.md file. It's in MarkDown format and will be rendered to beautiful HTML when you visit your GitHub repo.

Student Information

Please also edit README.md and replace your instructor's name and NetID with your own:

Student name: Jan LI

Student NetID: jl133

Your NetID is typically your initials and a numeric digit. That's what we need here.

If you contacted us in advance and we approved a late submission, please cut-and-paste the text from that email here.

Problem 1

  • Scenario: Grading
  • Assumptions:
    • We have a system where the only people with read access to all submissions and write access to the grading records are the grader and instructors. This system will also be completely inaccessible to people outside of the class. Additionally, this system will also be able to identify the grader such that nobody can impersonate the grader to gain their privileges and access. In particular, we assume the grader won't get phished or be robbed of their physical keys. In this system, submissions can't be changed after the due datetime, and submission datetimes can't be forged. We will also assume each submission was actually submitted by the person whose name or other identifier is indicated on the submission (i.e. Alice didn't submit work under Bob's name).
  • Assets:
    • We want to protect the confidentiality and privacy of several things. The names or identities of students shall remain unknown to everybody except for the grader and instructors. Each student's submissions should not be accessible to anybody except the particular student, the grader, and instructors. Furthermore, each student's grades should not be viewable to anyone except for the particular student, the grader, and instructors. Imagine the uproar if Alice could see Bob's grade!
    • We also want to protect the integrity of grades and submissions. By assumption, submissions can't be changed. And for grades, we want to make sure a student can't change their (or anyone else's) grade.
    • The availability of submissions and grades also needs to be protected. If submissions are unavailable, I won't be able to grade them. If grades are unavailable, the students will be displeased. If grades are somehow erased from the system, then there will have been a lot of wasted effort!
    • Lastly, we need to protect the authenticity of submissions and grades. The authenticity of submissions is by assumption. The authenticity of grades, namely that a particular submission was actually graded by the grader, rather than someone else, is also by assumption. Specifically, we assume only the grader (and instructors) have write access to the grading records.
  • Threats:
    • There are several threats to the confidentiality and privacy of student identities, submissions, and grades. If the grading occurs in a room, an attacker could place a camera, microphone, or other bug in the room to obtain information, especially grades. Or an attacker could pull a fire alarm during grading and run into the room and view graded submissions. If all of the class happens to be managed on an insecure analogue of the Canvas LMS, an attacker could simply sniff packets.
    • An attacker may also seek to violate the integrity of grades and submissions. One could affect submissions by physically entering the grading room and throwing away or changing answers on paper submissions. Another way is by submitting a GitHub commit with a forged timestamp. To change grades on a paper gradebook, an attacker can sneak into the grading room and erase the grader's grade and write in their preferred grade. If grading is digital, an attacker could hack into the digital gradebook and modify the values, possibly by using remote desktop malware on the grader's computer.
    • An attacker may also seek to violate the availability of submissions or grades. One way is by accessing the gradebook or submissions and deleting or throwing away everything. Another way is by shutting off the power to and spraying asbestos all over the grading room, ensuring grades for in-paper submissions can't come out until the room is made safe again.
    • Lastly, an attacker Alice may seek to violate authenticity by making a low-quality submission under the name of Bob, or by hiring a friend to make a good submission under the name of Alice.
  • Countermeasures:
    • To counter an attacker targeting confidentiality, integrity, availability, or authenticity, we can store submissions and grades under lock and key to which only the grader would have access, and restrict access to the grading room by the same methods. For online systems, we can also use a secure and encrypted service with a proper login system with permissions, and train the grader to not give out their login credentials. These countermeasures are all low-cost and have decent benefits. At Rice University, these are usually sufficient countermeasures, because there isn't a rampant cheating culture for most classes.
    • The following countermeasures are more costly, but can confer necessary benefits if we are operating in a situation with a rampant cheating culture. We can check the grading room for espionage equipment, and restrict access to whatever grading room we use. This includes securing the ceiling to ensure nobody sneaks in through it (this has actually happened before). Auto-closing and auto-locking doors can defend against the fire alarm approach. We can also install security cameras and security guards everywhere around the grading room, so any attacker will be more discouraged via prosecution.
    • We will need additional countermeasures to defend against the "forged timestamp GitHub commit" attack. One countermeasure is simply for the submission server to record its own time when the submission is made. In the case of COMP 215, this was achieved by using the timestamps of Travis-CI builds. This is low-cost and confers decent benefits.
    • A decent countermeasure for protecting authenticity is the combination of names, student IDs, and the Rice University Honor Code. Although this doesn't work 100% of the time, the assumptions take care of the rest.

Problem 2

  • Scenario: Stadium
  • Assumptions:
    • We assume the stadium has good build quality and therefore won't collapse under normal conditions. We also assume a car-dominated society, so people attending stadium games will be arriving in their own personal cars. We also assume one can't forge identification cards or steal keys. We assume the only people with keys or proper identification are those we can trust to do the right thing. Furthermore, our locks are somehow unpickable, and physical barriers are unbypassable.
  • Assets:
    • We value the confidentiality of a couple things. In order to prevent scandals, we want to ensure fair games by maintaining the confidentiality of team communication and what goes on in the locker room. We also want the attendance records (aside from the amount of people in attendance) a secret.
    • We also value the integrity of several things. We want to protect the integrity of any games the stadium will host. There would be a scandal if people could manipulate the high-profile football games. Additionally, we need to preserve the integrity of the people in attendance. As an example, people can be "modified" by being robbed.
    • We also value the stadium's availability. In particular, the stadium needs to be fully capable of hosting a packed game. Parking availability is also an important factor. If there aren't enough available parking spaces, attendance will take a hit.
    • The privacy of stadiumgoers must also be protected. Nobody wants their bathroom activities to be viewable by another person.
    • We also care about authenticity. In particular, we need to make sure whoever enters the stadium is who they claim to be.
  • Threats:
    • One could attack confidentiality and privacy in several ways. One way is by placing cameras or other recording devices in various places in the stadium. If it's in the bathroom, it's attacking privacy. If it's in the locker room or wherever on the field the team discusses plays with each other, it's an attack on confidentiality. If the cameras are at the stadium entrances, the attacker will know everybody who's attending the game, which is attack on the stadiumgoers' privacy. Lastly, we want to keep the game confidential, specifically preventing unauthorized viewing of the game in order to protect the stadium revenue.
    • Integrity can be threatened in several ways. During a game, by eavesdropping on the teams as discussed in confidentiality attacks, a team can gain an unfair advantage. Another possible attack is for a fan with a fan to blow powerful streams of wind at the football, possibly leading to a missed field goal or an incompleted pass. One could also manipulate the game by breaking into the scoreboard and changing the numbers, which even in the best case will disrupt the game. Streakers, throwing projectiles onto the field, or even shooting are other ways to disrupt the game as well.
    • Another threat to integrity concerns the stadiumgoers' welfare. In particular, people need to be safe from being robbed, injured, or otherwise having their integrity compromised.
    • There are some threats to availability as well. The night before a big game, a rogue drone operator could dump asbestos all over the seating and the field, which would make the stadium unavailable for quite a while. Other attacks on availability include pranks requiring a stadium closing and people unaffiliated with the games using the parking lot.
    • There is basically one type of threat to authenticity. One person will pretend to be another. Anybody could pretend to be a coach, player, referee, security guard, custodian, ticket holder, or other personnel in order to gain undeserved privileges. At best, it is simply a fan who will do anything to meet a star player, and at worst, it is somebody who seeks to cause death.
  • Countermeasures:
    • To prevent the planting of espionage devices, we can restrict access to key parts of the stadium using physical barriers, locked doors and gates. We will ignore the fact that locks can be picked based on our assumption. We can also have entrance security, such as metal detectors or airport-style scanning machines, to ensure no prohibited items are brought in. We can also have maintenance staff periodically check bathrooms and other key areas for hidden cameras. These countermeasures have reasonable cost and have good benefits. Note that an overly invasive scanning protocol could unnecessarily cost fan enjoyment.
    • To prevent unauthorized viewing of the game, we can "hire" birds or other agents that target unlicensed drones flying above the stadium. Depending on the financial situation, this may not be worth the cost, as drones cannot replicate the experience of being in the middle of an excited crowd.
    • Protecting the stadiumgoers' welfare can be done by forbidding weapons at the entrance, with entrance security like metal detectors or other scanners to check for them. The degree of scanning again depends on the cost-security calculus at play. Furthermore, there should be a limit on the amount of alcohol each person attending the game can buy, in order to prevent drunken fights. An alcohol tracking system should not be too costly if it relies on an app and every prospective drinker has a smartphone supporting such app, or if it uses handheld scanners, computer vision, and government identification cards. Note that we assume such identification can't be faked.
    • Protecting availability of the parking lot before and after a game is as easy as having controlled access with a computerized parking entry/exit ticket system, and/or calling tow trucks on cars present during a certain forbidden period. Edge cases, such as a car that won't start, or a woman suddenly in labor, can be addressed by having friendly security guards present as well. Protecting availability of the actual stadium can be achieved by building a reasonably unbreakable fence around the stadium. Fences and parking control and enforcement systems don't seem too expensive, but it is important to not be too eager to tow, else fans will become displeased, which is a longer-term cost itself.
    • To ensure authenticity, we can check people's identification and make sure it matches with their tickets and their physical appearance. While these can be forged or disguised in real life, we assume such is not possible because dealing with forgery is more involved.

Problem 3

  • Scenario: I am responsible for controlling access to a university's dining hall.
  • Assumptions:
    • We assume students are allowed to re-enter the dining hall during the same meal. We also assume locks work as intended, and no attackers have the keys.
  • Assets:
    • We want to protect the confidentiality and privacy of the students and their metadata regarding entering the dining hall. Few students would want the whole world to know they went into a certain dining hall at 6:40 PM, for instance.
    • Availability of the dining hall is also important. By this I mean that the dining hall should be accessible during scheduled hours, even if a prankster wants to change that. Additionally, food and drink, and diningware should be available. If we run out of diningware, how are people going to eat? Students are expected to change the dining hall a little by taking food and drink, but we don't want them to take too much.
    • We want to protect authenticity in the following way: a student should be who they claim to be. Otherwise, if Alice, who didn't pay the university for dining services, pretends to be Bob, who has a meal plan, then Alice gets free food at the cost of everyone else.
  • Threats:
    • If we use electronic scanning machines to look at a student's identification card to see if they have dining hall access, then an attacker could violate confidentiality and privacy by putting a card skimmer on the machines.
    • An attacker can make the dining hall unavailable by convincing 100 students to take all the plates, forks, spoons, and knives from the dining hall. Other ways to attack availability is by dumping asbestos all over the dining hall grounds, or by bringing in a vuvuzela flash mob.
    • To attack authenticity on an identification card-based entrance system, two people who look reasonably similar can use the same identification card.
  • Countermeasures:
    • To defend against a card skimmer, one can place the machines under lock and key when unsupervised, and periodically manually check for skimmers. Combined with security cameras for evidence gathering, criminal law regarding skimmers serves as a good deterrent against many attackers. The cost of these countermeasures is relatively low, but the potential benefits are high.
    • To defend against one type of availability attacks, one can look at students leaving the dining hall to see if they are taking excessive food, drink, or diningware. The cost of this depends on implementation. If it's a narrow exit gate with a security guard stationed to inspect students, the cost will be high in terms of student inconvenience. If it's simply employees keeping an eye out, the costs are lower, but the benefits are less, because a student can still get away with taking excessive resources. However, a student can't expect to get away with it forever, so this method would still discourage students, and the benefits should be sufficient enough.
    • Defending against a vuvuzela flash mob is as simple has having campus police to kick them out. While the response time might be ten minutes, the (marginal) cost is pretty low, and the benefits are good enough. An asbestos attack can be disincentivized by use of security cameras and criminal penalties. A higher-cost deterrent may involve turnstiles and security guards, but most university campuses are safe enough so as to not make these worthwhile.
    • Countering two people trying to use the same card can be done with fingerprint verification, which is harder to forge, especially when someone is stationed at the entrance watching out for any attack.

About

comp427-hw1-paranoia-jli6 created by GitHub Classroom

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published