CMSC 313 Project 4
The Atomic Binary Bomb
Assigned |
Monday, Nov 1, 2010 |
Program Due |
11:59pm, Tuesday Nov 16 |
Points |
90 points
see project handout
|
Updates |
|
Objectives
Completing this assignment should further your proficiency in:
- examining, interpreting and reverse engineering assembly language
- use of the gdb debugger and other Unix tools
Project Policy
This project may be a team project. You may work together with one other student from either section on this project. If you wish to work alone, that's fine too.
Both students on the team will receive the same grade for the project.
Please be sure to revisit the course project collaboration policy to determine if/how teams may help each other.
Project Description
In this project you will be provide with an executable program (the Atomic Bomb) which must be defused before
exploding an disintegrating the UMBC campus. To defuse the bomb you must must input 6 text strings -- one for
each "phase" of the bomb. To determine which strings defuse your bomb, you must analyze the binary
executable using gdb, objdump, strings and other Unix tools.
Project details may be found in this project handout.
Grading
Each defused phase is worth 15 points.
Each time the bomb explodes, you lose 1/4 point
to a max of 10 points (rounded down).
There is no explicit submittal for this project.
Everytime you attempt to defuse your bomb, a notification is sent to your instructor and
the bomb status webpage
is updated with your new project score.
Extra Credit is available in this project. That's all we can say.... it's supposed to be a secret.