Security Applications of Formal Language Theory

被引:32
作者
Sassaman, Len [1 ]
Patterson, Meredith L. [2 ]
Bratus, Sergey [3 ]
Locasto, Michael E. [4 ]
机构
[1] Katholieke Univ Leuven, B-3000 Louvain, Belgium
[2] Red Lambda, Longwood, FL 32779 USA
[3] Dartmouth Coll, Hanover, NH 03755 USA
[4] Univ Calgary, Calgary, AB T2N 1N4, Canada
来源
IEEE SYSTEMS JOURNAL | 2013年 / 7卷 / 03期
关键词
Language-theoretic security; secure composition; secure protocol design; INJECTION ATTACKS; AMBIGUITY;
D O I
10.1109/JSYST.2012.2222000
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a formal language theory approach to improving the security aspects of protocol design and message-based interactions in complex composed systems. We argue that these aspects are responsible for a large share of modern computing systems' insecurity. We show how our approach leads to advances in input validation, security modeling, attack surface reduction, and ultimately, software design and programming methodology. We cite examples based on real-world security flaws in common protocols, representing different classes of protocol complexity. We also introduce a formalization of an exploit development technique, the parse tree differential attack, made possible by our conception of the role of formal grammars in security. We also discuss the negative impact unnecessarily increased protocol complexity has on security. This paper provides a foundation for designing verifiable critical implementation components with considerably less burden to developers than is offered by the current state of the art. In addition, it offers a rich basis for further exploration in the areas of offensive analysis and, conversely, automated defense tools, and techniques.
引用
收藏
页码:489 / 500
页数:12
相关论文
共 94 条
[1]   A FINAL SOLUTION TO DANGLING ELSE OF ALGOL 60 AND RELATED LANGUAGES [J].
ABRAHAMS, PW .
COMMUNICATIONS OF THE ACM, 1966, 9 (09) :679-&
[2]  
Ali W., 2011, INT J COMPUT APPL, V17, P13
[3]  
[Anonymous], PHRACK, V57
[4]  
[Anonymous], 2006, CVE20062314
[5]  
[Anonymous], 2005, CVE20053962
[6]  
[Anonymous], P IEEE INT S SEC SOF
[7]  
[Anonymous], 2011, CVE20111153
[8]  
[Anonymous], 1996, PHRACK
[9]  
[Anonymous], 2008, COMMON WEAKNESS ENUM
[10]  
[Anonymous], 2006, CVE20062313