2014
DOI: 10.1109/msp.2014.1
|View full text |Cite
|
Sign up to set email alerts
|

Beyond Planted Bugs in "Trusting Trust": The Input-Processing Frontier

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 1 publication
0
8
0
Order By: Relevance
“…The current measurements are out of the control of the attacker. The language of the protocol is context-free and thus can be verified using Languagetheoretic security approaches [4]. By verifying the parser, we have an assurance that even if the attacker compromises the machine, it cannot spread to POWERALERT.…”
Section: B Poweralert's Attack Surfacementioning
confidence: 99%
“…The current measurements are out of the control of the attacker. The language of the protocol is context-free and thus can be verified using Languagetheoretic security approaches [4]. By verifying the parser, we have an assurance that even if the attacker compromises the machine, it cannot spread to POWERALERT.…”
Section: B Poweralert's Attack Surfacementioning
confidence: 99%
“…Protocols that have a context-sensitive grammar, e.g., include length fields, are more susceptible to the types of defects that can be found with fuzzing, whereas regular languages are easier to parse correctly (Bratus et al, 2014). Unfortunately, formal language theory is not likely to be within the skillset of developers performing threat modelling.…”
Section: Identifying Attack Surface Through Threat Modellingmentioning
confidence: 99%
“…Our presented approach shares the fundamental notion with existing work on Language-theoretic security (LangSec) [24] that shotgun parsers [1], [25] will not solve the input validation problem. In addition, we perceive that input handling does not stop after parsing but is a challenge when producing output as well.…”
Section: Related Workmentioning
confidence: 99%
“…books published by O'Reilly won't work in a SQL query. 1 package de.se_rwth.format; To bypass this limitation, escape sequences are used to encode control tokens within data tokens. As mentioned before, escape sequences are context-specific, and a context corresponds to a token in the language's grammar.…”
Section: Defining Correct Unparser and Encodermentioning
confidence: 99%
See 1 more Smart Citation