Exam 2
Location: In Class
Closed book, No notes
Study the lecture slides available on the web site, and other readings
Secure email (example of how we combine symmetric and asymmetric encryption to send an encrypted message). Understand the theory of how the two common systems we studied work and know the differences between them
TLS Handshake
Buffer Overflow Attacks
diagram and the state that the program is in and will be in
Binary extraction attacks and the use of a debugger.
Integer Manipulation Vulnerabilities
Passwords
Ken Thompson compiler hack - how it works
Principle of Least Privilege and how it relates to Defense in Depth
ANYTHING in any of your projects, or homework assignments.
Review Exam 1 problems
Remaining topics are for final exam
Social Engineering