Security Applications of Formal Language Theory

被引:31
|
作者
Sassaman, Len [1 ]
Patterson, Meredith L. [2 ]
Bratus, Sergey [3 ]
Locasto, Michael E. [4 ]
机构
[1] Katholieke Univ Leuven, B-3000 Louvain, Belgium
[2] Red Lambda, Longwood, FL 32779 USA
[3] Dartmouth Coll, Hanover, NH 03755 USA
[4] Univ Calgary, Calgary, AB T2N 1N4, Canada
来源
IEEE SYSTEMS JOURNAL | 2013年 / 7卷 / 03期
关键词
Language-theoretic security; secure composition; secure protocol design; INJECTION ATTACKS; AMBIGUITY;
D O I
10.1109/JSYST.2012.2222000
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a formal language theory approach to improving the security aspects of protocol design and message-based interactions in complex composed systems. We argue that these aspects are responsible for a large share of modern computing systems' insecurity. We show how our approach leads to advances in input validation, security modeling, attack surface reduction, and ultimately, software design and programming methodology. We cite examples based on real-world security flaws in common protocols, representing different classes of protocol complexity. We also introduce a formalization of an exploit development technique, the parse tree differential attack, made possible by our conception of the role of formal grammars in security. We also discuss the negative impact unnecessarily increased protocol complexity has on security. This paper provides a foundation for designing verifiable critical implementation components with considerably less burden to developers than is offered by the current state of the art. In addition, it offers a rich basis for further exploration in the areas of offensive analysis and, conversely, automated defense tools, and techniques.
引用
收藏
页码:489 / 500
页数:12
相关论文
共 50 条
  • [1] APPLICATIONS OF SCHEDULING THEORY TO FORMAL LANGUAGE THEORY
    GONCZAROWSKI, J
    WARMUTH, MK
    [J]. THEORETICAL COMPUTER SCIENCE, 1985, 37 (02) : 217 - 243
  • [2] Formal Language Theory for Practical Security - Extended Abstract -
    Jakoby, Andreas
    Leuther, Jannis
    Lucks, Stefan
    [J]. 2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2021), 2021, : 101 - 110
  • [3] The formal language theory column
    Dipartimento di Informatica, Università degli Studi di Milano, 20135 Milano, Italy
    [J]. Bull. Eur. Assoc. Theor. Comput. Sci., (69):
  • [4] FORMAL LANGUAGE THEORY - PREFACE
    SALOMAA, A
    [J]. DISCRETE APPLIED MATHEMATICS, 1991, 32 (02) : 83 - 83
  • [5] FORMAL LANGUAGE AND AUTOMATA THEORY
    KOBAYASHI, K
    NISHIO, H
    NOZAKI, A
    TAKAHASHI, M
    [J]. JAPAN ANNUAL REVIEWS IN ELECTRONICS COMPUTERS & TELECOMMUNICATIONS, 1983, 7 : 31 - 49
  • [6] FORMAL THEORY AND THE ECOLOGY OF LANGUAGE
    SEUREN, PAM
    [J]. THEORETICAL LINGUISTICS, 1986, 13 (1-2) : 1 - 18
  • [7] Formal language theory - Preface
    Rozenberg, G
    Salomaa, A
    [J]. THEORETICAL COMPUTER SCIENCE, 1997, 183 (01) : 1 - 1
  • [8] INDUCTIVE DEFINABILITY IN FORMAL LANGUAGE THEORY
    SCHULER, PF
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1978, 16 (03) : 400 - 412
  • [9] Agents in Formal Language Theory: An Overview
    Dolores Jimenez-Lopez, M.
    [J]. HIGHLIGHTS IN PRACTICAL APPLICATIONS OF AGENTS AND MULTIAGENT SYSTEMS, 2011, 89 : 283 - 290
  • [10] Hyperbolic tilings and formal language theory
    Margenstern, Maurice
    Subramanian, K. G.
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2013, (128): : 126 - 136