quiz 2 post-mortem bruce maggs. 2 create a new bitcoin address, and use it only once. e.g., create a...

10
Quiz 2 Post-Mortem Bruce Maggs

Upload: mervyn-fleming

Post on 19-Jan-2018

215 views

Category:

Documents


0 download

DESCRIPTION

3 Unlike TOR, all BitCoin transactions must be recorded in the public ledger. So it is possible for anyone to see who first transferred the BitCoin into the BitTOR relay network, and who received the BitCoin from the BitTOR network.

TRANSCRIPT

Page 1: Quiz 2 Post-Mortem Bruce Maggs. 2 Create a new BitCoin address, and use it only once. E.g., create a new wallet. Create a new address and mine a BitCoin

Quiz 2 Post-Mortem

Bruce Maggs

Page 2: Quiz 2 Post-Mortem Bruce Maggs. 2 Create a new BitCoin address, and use it only once. E.g., create a new wallet. Create a new address and mine a BitCoin

2

Create a new BitCoin address, and use it only once. E.g., create a new wallet.

Create a new address and mine a BitCoin. Alternately, mail cash through U.S. Postal Service, along with your BitCoin address to someone who will exchange cash for BitCoin. (Illegal: steal someone’s BitCoin wallet.)

Page 3: Quiz 2 Post-Mortem Bruce Maggs. 2 Create a new BitCoin address, and use it only once. E.g., create a new wallet. Create a new address and mine a BitCoin

3

Unlike TOR, all BitCoin transactions must be recorded in the public ledger. So it is possible for anyone to see who first transferred the BitCoin into the BitTOR relay network, and who received the BitCoin from the BitTOR network.

Page 4: Quiz 2 Post-Mortem Bruce Maggs. 2 Create a new BitCoin address, and use it only once. E.g., create a new wallet. Create a new address and mine a BitCoin

4

Both certificates are legitimate and will be accepted without any warnings or problems.

Malware signed with the certificate would not create any warning messages on installation, in fact, the user would be told the software came from a reliable publisher.

The attacker can set up a fake Web site that appears to the user to be legitimate, i.e., no warnings about a bad certificate. Then the attacker can act as a man in the middle between the user and the actual site, e.g., a bank Web Site.

Page 5: Quiz 2 Post-Mortem Bruce Maggs. 2 Create a new BitCoin address, and use it only once. E.g., create a new wallet. Create a new address and mine a BitCoin

5

It is inconvenient and expensive to get your server certificate signed, and the threat of man-in-the-middle attacks is perceived as being low.

The client can verify that the server has had its identity checked by a reputable certificate authority. This guarantee provides more assurance than simply knowing that the public key has or has not been seen before.

Page 6: Quiz 2 Post-Mortem Bruce Maggs. 2 Create a new BitCoin address, and use it only once. E.g., create a new wallet. Create a new address and mine a BitCoin

6

Alice sends ga to Bob and Carol, Bob sends gb to Alice and Carol, and Carol sends gc to Alice and Bob.Alice computes gab and gac, sends gab to Carol, gac to Bob. Bob sends gbc to Alice.Alice, Bob, and Carol can each compute gabc.

Page 7: Quiz 2 Post-Mortem Bruce Maggs. 2 Create a new BitCoin address, and use it only once. E.g., create a new wallet. Create a new address and mine a BitCoin

7

The return address is not overwritten, so the attacker cannot transfer program execution to any code that might be injected by the buffer overflow.

Page 8: Quiz 2 Post-Mortem Bruce Maggs. 2 Create a new BitCoin address, and use it only once. E.g., create a new wallet. Create a new address and mine a BitCoin

8

The attacker can now overwrite the return address and then inject the code that is to be executed on return.

Page 9: Quiz 2 Post-Mortem Bruce Maggs. 2 Create a new BitCoin address, and use it only once. E.g., create a new wallet. Create a new address and mine a BitCoin

9

The text section should be read-only (or any attempts to modify it should cause a crash), and the program counter should not be allowed to go out of the text section.

Page 10: Quiz 2 Post-Mortem Bruce Maggs. 2 Create a new BitCoin address, and use it only once. E.g., create a new wallet. Create a new address and mine a BitCoin

10

All connections pass through the firewall. The firewall can keep track of all connections initiated by hosts on the home network (and provide port-address translation if needed), and not allow packets in from outside for connections that aren’t already established, i.e., it provides protections (a) and (b).