Paper Reading Questions
For each paper, your assignment is two-fold. Before lecture:
- Submit your answer for each lecture's paper question via the
submission web site in a file named
lecn.txt , and
- Submit your own question about the paper (e.g., what you find most confusing about
the paper or the paper's general context/problem) in a file named
sqn.txt . You cannot use the question below. To the
extent possible, during lecture we will try to answer these questions. If
you submit your question before midnight the day before lecture, then there
is a chance we will answer by email. Below, we have included the questions
we've received from students in past years (when available), along with
answers to those questions, in case you find it helpful.
Once you submit your own question and answer (or after the deadline
has passed), you can view the
questions
and
answers
that other students submitted.
Lecture 14
Table 1 lists key pinning through DNS as achieving better defense against
detecting MITM attacks than key pinning based on client history. Give an
example of an MITM attack that can DNS key pinning can detect but
key-pinning based on history won't. (A description of DANE is here.)
|