Formal Language Theory for Practical Security - Extended Abstract -

被引:0
|
作者
Jakoby, Andreas [1 ]
Leuther, Jannis [1 ]
Lucks, Stefan [1 ]
机构
[1] Bauhaus Univ Weimar, Weimar, Germany
关键词
D O I
10.1109/SPW53761.2021.00023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
When binary data are sent from one party to another one, the encoding of the data can be described as a "data serialisation" language (DaSeL). Many DaSeLs employ the "length-prefix" pattern for strings, containers and other data items of variable length. This consists of an encoding of the item's length, followed by an encoding of the item itself without closing brackets or "end" symbols. The receiver must determine the final byte from the length read before. Length-prefix languages are not context-free. Thus, the plethora of tools and methods to specify, analyse, and parse context-free languages appears to be useless for length-prefix languages. This seems to explain why improper specifications of length-prefix languages and buggy hand-written parsers are so often a root cause for security issues and exploits, as, e.g., in the case of the famous Heartbleed bug. One might even be tempted to consider the use of length-prefix languages a security hazard. But this consideration would be wrong. We present a transformation of words from "calc-context-free" languages (a superset of context-free and length-prefix languages) into words from proper context-free languages. The transformation actually allows to use tools from context-free languages to deal with length-prefix languages. Our transformation runs on a Turing machine with logarithmic space. This implies the theoretical result of calc-context-free languages being in the complexity class logCFL. Similarly, deterministic calc-context-free languages are in logDCFL. To run in linear time, one needs to enhance the Turing machine by a stack to store additional data.
引用
收藏
页码:101 / 110
页数:10
相关论文
共 50 条
  • [41] Semantic hacking and intelligence and security informatics (Extended abstract)
    Thompson, P
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2003, 2665 : 390 - 390
  • [42] Expected π-Adic Security Measures of Sequences (Extended Abstract)
    Klapper, Andrew
    [J]. SEQUENCES AND THEIR APPLICATIONS - SETA 2008, 2008, 5203 : 219 - 229
  • [44] A Proof Theory for Model Checking: An Extended Abstract
    Heath, Quentin
    Miller, Dale
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2017, (238): : 1 - 10
  • [45] Politeness for the Theory of Algebraic Datatypes (Extended Abstract)
    Sheng, Ying
    Zohar, Yoni
    Ringeissen, Christophe
    Lange, Jane
    Fontaine, Pascal
    Barrett, Clark
    [J]. PROCEEDINGS OF THE THIRTIETH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2021, 2021, : 4829 - 4833
  • [46] A theory for Valiant's matchcircuits (extended abstract)
    Li, Angsheng
    Xia, Mingji
    [J]. STACS 2008: PROCEEDINGS OF THE 25TH INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE, 2008, : 491 - 502
  • [47] Extended abstract theory of universal series and applications
    Hadjiloucas, Demetris
    [J]. MONATSHEFTE FUR MATHEMATIK, 2009, 158 (02): : 151 - 178
  • [48] TOWARDS A THEORY OF SOFTWARE PROTECTION (EXTENDED ABSTRACT)
    GOLDREICH, O
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 : 426 - 439
  • [49] A Semantic Theory of the Internet of Things (Extended Abstract)
    Lanotte, Ruggero
    Merro, Massimo
    [J]. COORDINATION MODELS AND LANGUAGES, 2016, 9686 : 157 - 174
  • [50] Quantum Hoare Type Theory: Extended Abstract
    Singhal, Kartik
    Reppy, John
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2021, (340): : 291 - 302