Quiz 2 Post-Mortem Bruce Maggs


Quiz 2 Post-Mortem

Bruce Maggs

Create a new BitCoin address, and use it only once.

E.g., create a new wallet.

Create a new address and mine a BitCoin. Alternately, mail cash through U.S. Postal Service, along with your

BitCoin address to someone who will exchange cash for BitCoin. (Illegal: steal someone’s BitCoin wallet.)


Unlike TOR, all BitCoin transactions must be recorded in the public ledger. So it is possible for anyone to see who first transferred the BitCoin into the BitTOR relay network, and who received the BitCoin from the BitTOR network.


Both certificates are legitimate and will be accepted without any warnings or problems.

Malware signed with the certificate would not create any warning messages on installation, in fact, the user would be told the software came from a reliable publisher.

The attacker can set up a fake Web site that appears to the user to be legitimate, i.e., no warnings about a bad certificate. Then the attacker can act as a man in the middle between the user and the actual site, e.g., a bank Web Site.


It is inconvenient and expensive to get your server certificate signed, and the threat of man-in-the-middle attacks is perceived as being low.

The client can verify that the server has had its identity checked by a reputable certificate authority.

This guarantee provides more assurance than simply knowing that the public key has or has not been seen before.


Alice sends g a to Bob and Carol, Bob sends g b to Alice and Carol, and Carol sends g c to Alice and Bob.

Alice computes g ab and g ac , sends g ab to Carol, g ac to

Bob. Bob sends g bc to Alice.

Alice, Bob, and Carol can each compute g abc .


The return address is not overwritten, so the attacker cannot transfer program execution to any code that might be injected by the buffer overflow.


The attacker can now overwrite the return address and then inject the code that is to be executed on return.


The text section should be read-only (or any attempts to modify it should cause a crash), and the program counter should not be allowed to go out of the text section.


All connections pass through the firewall. The firewall can keep track of all connections initiated by hosts on the home network (and provide portaddress translation if needed), and not allow packets in from outside for connections that aren’t already established, i.e., it provides protections (a) and (b).