Formal Language Theory for Practical Security - Extended Abstract -

被引:0
|
作者
Jakoby, Andreas [1 ]
Leuther, Jannis [1 ]
Lucks, Stefan [1 ]
机构
[1] Bauhaus Univ Weimar, Weimar, Germany
关键词
D O I
10.1109/SPW53761.2021.00023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
When binary data are sent from one party to another one, the encoding of the data can be described as a "data serialisation" language (DaSeL). Many DaSeLs employ the "length-prefix" pattern for strings, containers and other data items of variable length. This consists of an encoding of the item's length, followed by an encoding of the item itself without closing brackets or "end" symbols. The receiver must determine the final byte from the length read before. Length-prefix languages are not context-free. Thus, the plethora of tools and methods to specify, analyse, and parse context-free languages appears to be useless for length-prefix languages. This seems to explain why improper specifications of length-prefix languages and buggy hand-written parsers are so often a root cause for security issues and exploits, as, e.g., in the case of the famous Heartbleed bug. One might even be tempted to consider the use of length-prefix languages a security hazard. But this consideration would be wrong. We present a transformation of words from "calc-context-free" languages (a superset of context-free and length-prefix languages) into words from proper context-free languages. The transformation actually allows to use tools from context-free languages to deal with length-prefix languages. Our transformation runs on a Turing machine with logarithmic space. This implies the theoretical result of calc-context-free languages being in the complexity class logCFL. Similarly, deterministic calc-context-free languages are in logDCFL. To run in linear time, one needs to enhance the Turing machine by a stack to store additional data.
引用
收藏
页码:101 / 110
页数:10
相关论文
共 50 条
  • [31] APPLICATIONS OF SCHEDULING THEORY TO FORMAL LANGUAGE THEORY
    GONCZAROWSKI, J
    WARMUTH, MK
    [J]. THEORETICAL COMPUTER SCIENCE, 1985, 37 (02) : 217 - 243
  • [32] Key agreement protocols and their security analysis (Extended abstract)
    Blake-Wilson, S
    Johnson, D
    Menezes, A
    [J]. CRYPTOGRAPHY AND CODING, PROCEEDINGS, 1997, 1355 : 30 - 45
  • [33] Software Security Factors in Design Phase (Extended Abstract)
    Chandra, S.
    Khan, R. A.
    Agrawal, A.
    [J]. INFORMATION SYSTEMS, TECHNOLOGY AND MANAGEMENT-THIRD INTERNATIONAL CONFERENCE, ICISTM 2009, 2009, 31 : 339 - 340
  • [34] The Communication and Computation Cost of Wireless Security - Extended Abstract
    Singelee, Dave
    Seys, Stefaan
    Batina, Lejla
    Verbauwhede, Ingrid
    [J]. WISEC 11: PROCEEDINGS OF THE FOURTH ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2011, : 1 - 3
  • [35] An NSF View of Multimedia Privacy and Security Extended Abstract
    Epstein, Jeremy
    [J]. PROCEEDINGS OF THE 2017 WORKSHOP ON MULTIMEDIA PRIVACY AND SECURITY (MPS'17), 2017, : 19 - 20
  • [36] Hybrid signcryption schemes with outsider security (Extended abstract)
    Dent, AW
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 203 - 217
  • [37] Security with Noisy Data (Extended Abstract of Invited Talk)
    Skoric, Boris
    [J]. INFORMATION HIDING, 2010, 6387 : 48 - 50
  • [38] Web services security: Techniques and challenges (extended abstract)
    Singhal, Anoop
    [J]. DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 158 - 158
  • [39] A model of program execution for security purposes, an extended abstract
    Liu, ZQ
    [J]. ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 509 - 513
  • [40] On the Security of the EMV Secure Messaging API (Extended Abstract)
    Adida, Ben
    Bond, Mike
    Clulow, Jolyon
    Lin, Amerson
    Anderson, Ross
    Rivest, Ronald L.
    [J]. SECURITY PROTOCOLS, 2010, 5964 : 147 - 149