For each paper, you should submit two text files via the Gradescope submission web site, as described below. The submission is due before lecture. (The Gradescope entry code for 6.5660 is 3JZ23X.)
answer.txt.
question.txt. You cannot use the question below. To the
extent possible, during lecture we will try to answer these questions. If
you submit your question before midnight the day before lecture, then there
is a chance we will answer by email. Below, we have included the questions
we've received from students in past years (when available), along with
answers to those questions, in case you find it helpful.
Lecture 17
Table 1 lists key pinning through DNS as achieving better defense against detecting MITM attacks than key pinning based on client history. Give an example of an MITM attack that can DNS key pinning can detect but key-pinning based on history won't. (A description of DANE is here.)