id
int64
question
string
choices
list
answer
string
6,456
Tick the \textbf{false} assertion. For a Vernam cipher...
[ "SUPERMAN can be the result of the encryption of the plaintext ENCRYPT", "CRYPTO can be used as a key to encrypt the plaintext PLAIN", "SERGE can be the ciphertext corresponding to the plaintext VAUDENAY", "The key IAMAKEY can be used to encrypt any message of size up to 7 characters" ]
C
6,457
Tick the \textit{incorrect} assertion. For two independent random variables $X,Y$ with the range in real numbers, we have that \ldots
[ "$\\phantom{\\mathrm{ar}}\\mathrm{E}[X+Y]=\\phantom{\\mathrm{ar}}\\mathrm{E}[X]+\\mathrm{E}[Y]$", "$\\phantom{\\mathrm{ar}}\\mathrm{E}[X \\mkern4.5mu \\cdot \\mkern4.5mu Y]=\\phantom{\\mathrm{ar}}\\mathrm{E}[X] \\mkern4.5mu \\cdot \\mkern4.5mu \\mathrm{E}[Y]$", "$\\mathrm{Var}[X+Y]=\\mathrm{Var}[X]+\\mathrm{Var}[Y]$", "$\\mathrm{Var}[X \\mkern4.5mu \\cdot \\mkern4.5mu Y]=\\mathrm{Var}[X] \\mkern4.5mu \\cdot \\mkern4.5mu \\mathrm{Var}[Y]$" ]
D
6,462
Assume we are in a group $G$ of order $n = p_1^{\alpha_1} p_2^{\alpha_2}$, where $p_1$ and $p_2$ are two distinct primes and $\alpha_1, \alpha_2 \in \mathbb{N}$. The complexity of applying the Pohlig-Hellman algorithm for computing the discrete logarithm in $G$ is \ldots (\emph{choose the most accurate answer}):
[ "$\\mathcal{O}(\\alpha_1 p_1^{\\alpha_1 -1} + \\alpha_2 p_2^{\\alpha_2 -1})$.", "$\\mathcal{O}(\\sqrt{p_1}^{\\alpha_1} + \\sqrt{p_2}^{\\alpha_2})$.", "$\\mathcal{O}( \\alpha_1 \\sqrt{p_1} + \\alpha_2 \\sqrt{p_2})$.", "$\\mathcal{O}( \\alpha_1 \\log{p_1} + \\alpha_2 \\log{p_2})$." ]
C
6,463
The Diffie-Hellman key agreement protocol \ldots
[ "\\ldots was invented by Rivest, Shamir and Adleman.", "\\ldots can be broken with a factoring oracle.", "\\ldots resists to active adversaries.", "\\ldots resists to passive adversaries." ]
D
6,464
Tick the \textbf{\emph{incorrect}} assertion.
[ "$P\\subseteq NP$.", "$NP\\subseteq IP$.", "$PSPACE\\subseteq IP$.", "$NP\\mbox{-hard} \\subset P$." ]
D
6,466
Tick the \emph{correct} statement. $\Sigma$-protocols \ldots
[ "are defined for any language in \\textrm{PSPACE}.", "have a polynomially unbounded extractor that can yield a witness.", "respect the property of zero-knowledge for any verifier.", "consist of protocols between a prover and a verifier, where the verifier is polynomially bounded." ]
D
6,468
Iterative composition ($\sim$ repeating the same protocol with different fresh random coins) \ldots
[ "\\ldots is a loss of time.", "\\ldots does not bring any added security.", "\\ldots can improve the completeness and soundness probability.", "\\ldots is done to test if the verifier can predict the future." ]
C
6,574
What makes \texttt{C++} inherently NOT type safe (i.e., unsafe casts may cause an object of type X be interpreted as type Y even though types X and Y are not related)?
[ "The absence of type information (and checks) for non-polymorphic objects at runtime.", "The use of function pointers makes static analysis intractable.", "Class and struct are indistinguishable at run-time due to their memory layout.", "The polymorphic inheritance between interface and classes." ]
A
6,576
Current software is complex and often relies on external dependencies. What are the security implications?
[ "During the requirement phase of the secure development\n lifecycle, a developer must list all the required dependencies.", "It is necessary to extensively security test every executable\n on a system before putting it in production.", "As most third party software is open source, it is safe by\n default since many people reviewed it.", "Closed source code is more secure than open source code as it\n prohibits other people from finding security bugs." ]
A
6,579
Which of the following hold true for cross-site scripting (XSS)?
[ "XSS is a form of code injection that gives the attacker\n arbitrary code execution.", "Reflected XSS requires that the server stores the injected\n code but the user does not need to click on any special link.", "Client-side XSS is a unique problem of GMail.", "XSS can only be used to leak private data of a user." ]
A
6,582
Does AddressSanitizer prevent \textbf{all} use-after-free bugs?
[ "No, because quarantining free’d memory chunks forever prevents\n legit memory reuse and could potentially lead to out-of-memory\n situations.", "No, because UAF detection is not part of ASan's feature set.", "Yes, because free’d memory chunks are poisoned.", "Yes, because free’d memory is unmapped and accesses therefore\n cause segmentation faults." ]
A
6,584
Which of the below security policies are violated by the following code snippet? \begin{lstlisting}[language=C,style=c] char *foo(int b) { char c = (char)(b & 0xff); return &c; } int main(int argc, char *argv[]) { char buf[100] = {0}; int x = 0x539; // 1337 int y = (int)(*foo(x)); putc(buf[y]); return 0; } \end{lstlisting}
[ "Temporal memory safety", "Spatial memory safety", "Type safety", "None of the other answers" ]
A
6,587
Which of the following measures will always improve fuzzing executions per second?
[ "Reducing overheads imposed by the fuzzing framework.", "Performing structure-aware input generation.", "Providing dictionaries for input generation.", "Collecting code coverage as feedback." ]
A
6,599
In x86-64 Linux, the canary is \textbf{always} different for every?
[ "Thread", "Function", "Process", "Namespace" ]
A
6,604
Is Java as a programming language considered memory safe? Why? (note: excluding Java Native Interface, the use of \texttt{sun.misc.unsafe}, or bugs in the JVM)
[ "Yes, because the JVM guarantees spatial and temporal memory safety at all times.", "Yes, because you can't access objects by reference in Java.", "No, there are Java programs vulnerable to use after free.", "No, there are Java programs vulnerable to type confusion." ]
A
6,608
You share an apartment with friends. Kitchen, living room, balcony, and bath room are shared resources among all parties. Which policy/policies violate(s) the principle of least privilege?
[ "Different bedrooms do not have a different key.", "There is no lock on the fridge.", "To access the kitchen you have to go through the living room.", "Nobody has access to the neighbor's basement." ]
A
6,615
Which of the following statement(s) is/are true about CFI?
[ "When producing valid target sets, missing a legitimate target is unacceptable.", "CFI’s checks of the valid target set are insufficient to protect every forward edge control-flow transfer", "Keeping the overhead of producing valid target sets as low as possible is crucial for a CFI mechanism.", "CFI prevents attackers from exploiting memory corruptions." ]
A
6,622
When a test fails, it means that:
[ "either the program under test or the test itself has a bug, or both.", "the program under test has a bug.", "the test is incorrect.", "that both the program and the test have a bug." ]
A
6,624
Which of the following statement(s) is/are true about different types of coverage for coverage-guided fuzzing?
[ "If you cover all edges, you also cover all blocks", "Full line/statement coverage means that every possible\n control flow through the target has been covered", "Full data flow coverage is easier to obtain than full edge coverage", "Full edge coverage is equivalent to full path coverage\n because every possible basic block transition has been covered" ]
A
6,625
Which of the following is/are typical AddressSanitizer use cases?
[ "Out-of-bounds violations visibility increase during fuzzing", "Use-after-free mitigation in production", "Uninitialized variable detection during unit tests", "NULL-pointer dereference detection during fuzzing" ]
A
6,631
Which of the following is/are true about fuzzing libraries?
[ "Fuzzing libraries is harder than standalone executables as no\n single ``binary'' is available for a complex API.", "To fuzz effectively, every argument of every function must be\n fuzzed independently.", "Every function of a library is part of the API that needs to be fuzzed.", "FuzzGen's A\\textsuperscript{2}DG contains the control but not\n the data dependencies of the API calls." ]
A
6,632
Consider the Diffie-Hellman secret-key-exchange algorithm performed in the cyclic group $(\mathbb{Z}/11\mathbb{Z}^\star, \cdot)$. Let $g=2$ be the chosen group generator. Suppose that Alice's secret number is $a=5$ and Bob's is $b=3$. Which common key $k$ does the algorithm lead to? Check the correct answer.
[ "$10$", "$7$", "$8$", "$9$" ]
A
6,634
How many integers $n$ between $1$ and $2021$ satisfy $10^n \equiv 1 \mod 11$? Check the correct answer.
[ "1010", "183", "505", "990" ]
A
6,635
Consider a communication system consisting of a binary block code, an error channel, and a minimum-distance decoder. Check the correct statement about the minimum-distance decoder.
[ "It minimizes the error probability if the channel is a binary symmetric channel with crossover (flip) probability smaller than 1/2.", "It always minimizes the error probability.", "It minimizes the error probability if the channel is a binary symmetric channel.", "None of the others can be stated with certainty due to missing information." ]
A
6,640
Consider a $(7,4)$ Reed-Solomon code $\mathcal{C}$ over $\mathbb{F}_q$. Let $\vec{x} eq \vec{y}$ be two different information vectors. The corresponding codewords $c(\vec{x})$ and $c(\vec{y})$ match in at most:
[ "3 places.", "0 places.", "2 places.", "None of the others is correct." ]
A
6,641
You are given an i.i.d source with symbols taking value in the alphabet $\mathcal{A}=\{a,b,c,d\}$ and probabilities $\{1/8,1/8,1/4,1/2\}$. Consider making blocks of length $n$ and constructing a Huffman code that assigns a binary codeword to each block of $n$ symbols. Choose the correct statement regarding the average codeword length per source symbol.
[ "It is the same for all $n$.", "It strictly decreases as $n$ increases.", "None of the others.", "In going from $n$ to $n+1$, for some $n$ it stays constant and for some it strictly decreases." ]
A
6,642
Let ${\cal C}_1=\{00,01,100,101, 110, 111\}$ and ${\cal C}_2=\{00,01,100,101, 111\}$ be two source codes (We exclude the possibility of source symbols of zero probability.) Check the correct statement.
[ "${\\cal C}_1$ can be a Huffman code but not ${\\cal C}_2$.", "Both codes can be Huffman codes.", " ${\\cal C}_2$ can be a Huffman code but not ${\\cal C}_1$.", "Neither ${\\cal C}_1$ nor ${\\cal C}_2$ can be a Huffman code." ]
A
6,643
Let $0\leq\alpha\leq1$ be an unknown constant. Let $X$ be a random variable taking values in $\mathcal{X}=\{0,1,2\}$ with probability $p_X(0) = p_X(1) = \alpha$ and $p_X(2) = 1-2\alpha$. Let $Y$ be a random variable defined as follows egin{equation*}Y = egin{cases}1, & ext{if }X=2\0, & ext{if } X eq 2\end{cases}.\end{equation*} You also know that $H(X|Y) = rac{1}{2}$. Choose the correct value of $\alpha$.
[ "$\frac{1}{4}$", "$\frac{1}{2}$", "$1$", "$\frac{1}{8}$" ]
A
6,644
A bag contains the letters of LETSPLAY. Someone picks at random 4 letters from the bag without revealing the outcome to you. Subsequently you pick one letter at random among the remaining 4 letters. What is the entropy (in bits) of the random variable that models your choice? Check the correct answer.
[ "$\frac{11}{4}$", "$2$", "$\\log_2(7)$", "$\\log_2(8)$" ]
A
6,662
Consider the group $(\mathbb{Z} / 23 \mathbb{Z}^*, \cdot)$. Find how many elements of the group are generators of the group. (Hint: $5$ is a generator of the group.)
[ "$10$", "$22$", "$11$", "$2$" ]
A
6,663
Find $[3^{288294}]_{35}$.
[ "$29$", "$11$", "$9$", "$33$" ]
A
6,664
In RSA, we set $p = 7, q = 11, e = 13$. The public key is $(m, e) = (77, 13)$. The ciphertext we receive is $c = 14$. What is the message that was sent? (Hint: You may solve faster using Chinese remainder theorem.).
[ "$t=42$", "$t=14$", "$t=63$", "$t=7$" ]
A
6,665
Can a commutative group have two different identity elements, $e_1, e_2$?
[ "No.", "Yes, but only if they are inverses of each other.", "Yes, but only if $e_1^2 = e_2^2$.", "Yes, product groups always have two different identity elements." ]
A
6,666
Consider an RSA encryption where the public key is published as $(m, e) = (35, 11)$. Which one of the following numbers is a valid decoding exponent?
[ "$11$", "$7$", "$5$", "$17$" ]
A
6,667
Consider an RSA encryption where the public key is published as $(m, e) = (55, 17)$. Which one of the following numbers is a valid decoding exponent?
[ "$53$", "$23$", "$43$", "$83$" ]
A
6,672
Let $\mathcal{C}$ be a binary $(n,k)$ linear code with minimum distance $d_{\min} = 4$. Let $\mathcal{C}'$ be the code obtained by adding a parity-check bit $x_{n+1}=x_1 \oplus x_2 \oplus \cdots \oplus x_n$ at the end of each codeword of $\mathcal{C}$. Let $d_{\min}'$ be the minimum distance of $\mathcal{C}'$. Which of the following is true?
[ "$d_{\\min}' = 4$", "$d_{\\min}' = 5$", "$d_{\\min}' = 6$", "$d_{\\min}'$ can take different values depending on the code $\\mathcal{C}$." ]
A
6,673
Let $\mathcal{C}$ be a $(n,k)$ Reed-Solomon code on $\mathbb{F}_q$. Let $\mathcal{C}'$ be the $(2n,k)$ code such that each codeword of $\mathcal{C}'$ is a codeword of $\mathcal{C}$ repeated twice, i.e., if $(x_1,\dots,x_n) \in\mathcal{C}$, then $(x_1,\dots,x_n,x_1,\dots,x_n)\in\mathcal{C'}$. What is the minimum distance of $\mathcal{C}'$?
[ "$2n-2k+2$", "$2n-k+1$", "$2n-2k+1$", "$2n-k+2$" ]
A
6,689
Consider the following mysterious binary encoding:egin{center} egin{tabular}{c|c} symbol & encoding \ \hline $a$ & $??0$\ $b$ & $??0$\ $c$ & $??0$\ $d$ & $??0$ \end{tabular} \end{center} where with '$?$' we mean that we do not know which bit is assigned as the first two symbols of the encoding of any of the source symbols $a,b,c,d$. What can you infer on this encoding assuming that the code-words are all different?
[ "The encoding is uniquely-decodable.", "The encoding is uniquely-decodable but not prefix-free.", "We do not possess enough information to say something about the code.", "It does not satisfy Kraft's Inequality." ]
A
6,690
Suppose that you possess a $D$-ary encoding $\Gamma$ for the source $S$ that does not satisfy Kraft's Inequality. Specifically, in this problem, we assume that our encoding satisfies $\sum_{i=1}^n D^{-l_i} = k+1 $ with $k>0$. What can you infer on the average code-word length $L(S,\Gamma)$?
[ "$L(S,\\Gamma) \\geq H_D(S)-\\log_D(e^k)$.", "$L(S,\\Gamma) \\geq k H_D(S)$.", "$L(S,\\Gamma) \\geq \frac{H_D(S)}{k}$.", "The code would not be uniquely-decodable and thus we can't infer anything on its expected length." ]
A
6,707
Find all solutions of $24x + [9]_{45} = [13]_{45}$ in the range $[0,44]$. How many different solutions are there?
[ "$0$", "$1$", "$2$", "$3$" ]
A
6,708
Find $[5263^{79359}]_{15}$.
[ "$7$", "$12$", "$8$", "$13$" ]
A
6,709
Passing on secrets: Alice has posted her RSA credentials as $(m,e)$, with $m$ the modulus and $e$ the encoding exponent. As required by RSA, she keeps her decoding exponent $d$ preciously secret. Bob has a message $t_1$, RSA-encrypts it using $(m,e_1)$ and passes the resulting cryptogram $c_1$ on to Carlos. Carlos has a message $t_2$, RSA-encrypts it using $(m,e_2)$ to obtain the cryptogram $c_2$. Then, Carlos multiplies the two cryptograms, $(c_1\cdot c_2) \mod m,$ and passes this to Alice. Alice applies her regular RSA decryption to $(c_1\cdot c_2) \mod m.$ Under what condition is the result of this decryption exactly equal to the product $(t_1\cdot t_2) \mod m$?
[ "If $e_1=e_2=e$.", "If $e_1+e_2=e$.", "If for some integer $\\ell,$ we have $e_1 e_2 d=\\ell \\phi(m)+1,$ where $\\phi(\\cdot)$ denotes Euler's totient function.", "If $d$ is prime and $(e_1+e_2) \\mod m=1$." ]
A
6,710
A colleague challenges you to create a $(n-1,k,d_{min})$ code $\mathcal C'$ from a $(n,k,d_{min})$ code $\mathcal C$ as follows: given a generator matrix $G$ that generates $\mathcal C$, drop one column from $G$. Then, generate the new code with this truncated $k imes (n-1)$ generator matrix. The catch is that your colleague only gives you a set $\mathcal S=\{\vec s_1,\vec s_2, \vec s_3\}$ of $3$ columns of $G$ that you are allowed to drop, where $\vec s_1$ is the all-zeros vector, $\vec s_2$ is the all-ones vector, and $\vec s_3$ is a canonical basis vector. From the length of the columns $s_i$ you can infer $k$. You do not know $n$, neither do you know anything about the $n-3$ columns of $G$ that are not in $\mathcal S$. However, your colleague tells you that $G$ is in systematic form, i.e., $G=[I ~~ P]$ for some unknown $P$, and that all of the elements in $\mathcal S$ are columns of $P$. Which of the following options in $\mathcal S$ would you choose as the column of $G$ to drop?
[ "$\\vec s_1$ (the all-zeros vector).", "$\\vec s_2$ (the all-ones vector)", "$\\vec s_3$ (one of the canonical basis vectors).", "It is impossible to guarantee that dropping a column from $\\mathcal S$ will not decrease the minimum distance." ]
A
6,711
Let $\mathcal C$ be a $(n,k)$ linear block code over $\mathbb F_2$ of block length $n$ such that $n$ is even and minimum distance $d_{min}=3$. We construct a new code $\mathcal C'$ by appending onto each codeword $\vec x \in \mathcal C$ three parity bits as follows: $x_{n+1}=x_1 \oplus x_3 \oplus x_5 \oplus \ldots \oplus x_{n-1}$, $x_{n+2}=x_2 \oplus x_4 \oplus x_6 \oplus \ldots \oplus x_{n}$, $x_{n+3}=x_1 \oplus x_2 \oplus x_3 \oplus \ldots \oplus x_{n}$. Denote the minimum distance of this new linear block code by $d'_{min}$. Which of the following is true?
[ "We cannot tell with certainty what $d'_{min}$ is; it depends on $\\mathcal C$.", "$d'_{min}=3$", "$d'_{min}=4$", "$d'_{min}=5$" ]
A
6,712
Let $\mathcal C_1$ be a $(n_1,k)$ linear block code over $\mathbb F_p$ with $p$ prime and $|\mathcal C_1| = 27$. Let $\mathcal C_2$ be a $(n_2,k)$ linear block code over $\mathbb F_2$ of the same dimension $k$. Which of the following is true?
[ "$|\\mathcal C_2| = 8$", "$|\\mathcal C_2| = 16$", "$|\\mathcal C_2| = 27$", "$|\\mathcal C_2| = 21$" ]
A
6,713
Let $X_1,X_2,\dots$ be i.i.d. binary random variables with $p_{X_i}(1) = rac{1}{4}$ for every $i\geq 1$. Let $Y_1$ be a uniform binary random variable, and let $Y_i = Y_{i-1} \oplus X_{i-1}$ for every $i\geq 2$, where $\oplus$ denotes the modulo-2 sum. For any given $n\geq 1$, what is the value of $H(Y_1,Y_2,\dots,Y_n)$? [Hint: what is the value of $H(Y_i|Y_1,\dots,Y_{i-1})$?]
[ "$\\left(2-\frac{3}{4}\\log 3\right) n + \frac{3}{4}\\log 3 - 1$.", "$n$.", "$\\left(2-\frac{3}{4}\\log 3\right) n + 1$.", "$\\left(3 - \frac{3}{4}\\log 3\right) n +\frac{3}{4}\\log 3 -2$." ]
A
6,714
A binary prefix-free code $\Gamma$ is made of four codewords. The first three codewords have codeword lengths $\ell_1 = 2$, $\ell_2 = 3$ and $\ell_3 = 3$. What is the minimum possible length for the fourth codeword?
[ "$1$.", "$2$.", "$3$.", "$4$." ]
A