首页 > > 详细

SEC204编程讲解、辅导programming、c/c++程序设计辅导 解析Haskell程序|讲解R语言程序

项目预算:   开发周期:  发布时间:   要求地区:
Faculty of Science and Engineering
Coursework – 2020/21 Academic Year
Module Code: SEC204
Module Title: Computer Architecture and Low Level Programming
School: Computing, Electronics and Mathematics
SEC204 Coursework Assignment 2020/2021
Overview
This is individual coursework consisting of two tasks:
1. Hack/Unlock the ‘Tower of Hanoi’ game provided. To this end, you must reverse
engineer the binary code provided, analyse what it does and extract the
appropriate information [70%].
2. Write a small report describing methods and techniques to mitigate against
buffer overflow security exploit [30%].
Learning Outcomes
The above parts cover the following module learning outcomes, as described into
the module record on the DLE:
1. Interpret and manipulate assembly code via hardware debugging techniques
2. Apply reverse engineering techniques to identify main software flaws
3. Identify relevant countermeasures for main software flaws.
Part 1: Hack the Tower of Hanoi game
You are provided with a x86-64 binary file. This binary file runs only on Linux and
contains a well-known mathematical game / puzzle called ‘The Tower of Hanoi’. The
game is developed in the C programming language. To play the game you need to
type a valid username and password which are unknown. Your task is to extract the
username and password and thus unlock the game. To this end, you must reverse
engineer the binary file provided, analyse what it does and extract the information
needed. You are expected to use ‘gdb’ debugger, as you did in the ‘bomb’ lab session.
Assignment Brief
Assignment Title: Computer Architecture and Low Level
Programming - Coursework
Submission Deadline: Please check the DLE submission point
Submission: Online (DLE)
Contribution to Module Grade: 50%
Individual/Group Assignment: Individual
Module: SEC204
Module Leader: Dr Vasilios Kelefouras
This is an individual coursework. Collaboration with other students will be
considered as plagiarism and you may be required to attend a verbal examination
on request of the module leader.
The marking criteria are as follows (please see the rubric table below):
1. Extract the username. Justify the procedure followed. Provide the gdb
commands used to extract the username. [20 marks]
2. Extract the password. Justify the procedure followed. Provide the gdb
commands used to extract the username. [25 marks]
3. Unlock the next level of the game. Justify the procedure followed. Provide the
gdb commands used to extract the username. [25 marks]
Hint #1: the input is stored as an array of characters (1 byte each).
Hint #2: In the beginning of encrypt_phase2(), the values $0x236b6f23 and
$0x236b23 refer to ASCII characters [30 marks]
Marking criteria
Question.1
marks
0 marks 0-7 8-14 15-20
Question.1
marking
criteria
Nothing or
just the
username
is provided.
One of the following
occurs:
A. The student has not
solved the problem but has
reached to a point close to
the solution. The
username is not provided,
but the procedure followed
to this point has been
appropriately justified and
explained; all the gdb
commands needed to
reach this point are
provided. The student has
justified why each
step/action has been
followed.
B. Username is provided
but the procedure followed
is poorly justified and
explained
C. Username is provided
but the student has not
provided all the gdb
commands needed.
The username and all
the gdb commands
needed, are provided.
The student has
appropriately justified
the procedure followed.
The student has
appropriately explained
why each step/action
has been followed.
The student has not
accurately explained
the functionality of the
critical functions.
The username and all
the gdb commands
needed, are provided.
The student has
appropriately justified
the procedure
followed. The student
has appropriately
explained why each
step/action has been
followed.
The student has
appropriately reversed
engineer the critical
functions and has
accurately explained
their functionality.
Question.2
marks
0 marks 0-8 9-15 16-25
Question.2
marking
criteria
Same as
above
Same as above Same as above Same as above
Question.3
marks
0 marks 0-8 9-15 16-25
Question.3
marking
criteria
Same as
above
Same as above Same as above Same as above
Part 2: Write a small report describing methods and techniques to mitigate
against buffer overflow security exploit.
Write a small report (less than 700 words) describing methods and techniques to
mitigate against buffer overflow security exploit. [30 marks]
 Describe main strategies to defend against the attack. [15 marks]
 Discuss the effectiveness of existing detection and prevention
mechanisms, as well as the extent to which relevant secure software
development methodologies could help alleviate the problem [15 marks].
Submission Details and Deadlines
You must submit a ‘.docx’ file for part1 and part2.
Feedback and marks will be returned within 20 working days. Note that you may be
required to attend a verbal examination on request of the module leader. This can be
face to face or using Skype for Business. The purpose of this might be to clarify any
issues to facilitate assessment, as well as to help verify this is your own work. Failure
to participate may have a detrimental impact on your final grade.

软件开发、广告设计客服
  • QQ:99515681
  • 邮箱:99515681@qq.com
  • 工作时间:8:00-23:00
  • 微信:codinghelp
热点标签

联系我们 - QQ: 9951568
© 2021 www.rj363.com
软件定制开发网!