Editing TU Wien:Software Security VU (Weippl)/Final Exam 2017-06-09

Jump to navigation Jump to search

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.

Latest revision Your text
Line 5: Line 5:
 
* Assume you are given a combinatorial attack grammar for XSS having k types and g derivation rules per type to form an attack vector. Which of the following is more cost effective in terms of combinatorial testing. Adding more types or more derivation rules per type in the grammar? Justify your answer.
 
* Assume you are given a combinatorial attack grammar for XSS having k types and g derivation rules per type to form an attack vector. Which of the following is more cost effective in terms of combinatorial testing. Adding more types or more derivation rules per type in the grammar? Justify your answer.
 
* Explain the process of creation/verification when creating a new block in Ethereum.
 
* Explain the process of creation/verification when creating a new block in Ethereum.
* Write a BNF/ABNF/EBNF grammar for a datetime format.
+
 
* Name 2 test methods for testing a TLS/SSL implementation.
 
  
  

Please note that all contributions to VoWi are considered to be released under the GNU Free Documentation License 1.3 (see VoWi:Urheberrechte for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

Cancel Editing help (opens in new window)