Spring 2019

Paper Reading Questions

For each paper, your assignment is two-fold. Before lecture:

  • Submit your answer for each lecture's paper question via the submission web site in a file named lecn.txt, and
  • Submit your own question about the paper (e.g., what you find most confusing about the paper or the paper's general context/problem) in a file named sqn.txt. You cannot use the question below. To the extent possible, during lecture we will try to answer these questions. If you submit your question before midnight the day before lecture, then there is a chance we will answer by email. Below, we have included the questions we've received from students in past years (when available), along with answers to those questions, in case you find it helpful.

Lecture 14

Table 1 lists key pinning through DNS as achieving better defense against detecting MITM attacks than key pinning based on client history. Give an example of an MITM attack that can DNS key pinning can detect but key-pinning based on history won't. (A description of DANE is here.)

Questions or comments regarding 6.858? Send e-mail to the course staff at 6858-staff@lists.csail.mit.edu.

Top // 6.858 home // Last updated Monday, 04-Mar-2019 07:56:42 EST