2017 IEEE Security and Privacy Workshops (SPW) 2017
DOI: 10.1109/spw.2017.39
|View full text |Cite
|
Sign up to set email alerts
|

Writing Parsers Like it is 2017

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…3. In our evaluation, we also show that our approach is applicable in contexts in which no usable data flow of input fragments to variables exists, as well as for advanced parsers such as PEG parsers and parser combinators which make the state of the art for writing secure parsers [8]. None of these is possible with Autogram, again extending the state of the art.…”
Section: Introductionmentioning
confidence: 87%
See 2 more Smart Citations
“…3. In our evaluation, we also show that our approach is applicable in contexts in which no usable data flow of input fragments to variables exists, as well as for advanced parsers such as PEG parsers and parser combinators which make the state of the art for writing secure parsers [8]. None of these is possible with Autogram, again extending the state of the art.…”
Section: Introductionmentioning
confidence: 87%
“…When compared against learning from dynamic data flows (so far the only approach for inference of human-readable grammars), we found our approach to be superior in both precision and recall. (3) In our evaluation, we also show that our approach is applicable in contexts in which no usable data flow of input fragments to variables exists such as modern parsing techniques like parser combinators which make the state of the art for writing secure parsers [17,19].…”
Section: Introductionmentioning
confidence: 93%
See 1 more Smart Citation
“…In practical terms, systems programming languages with an emphasis on memory safety and strict typing are particularly useful for testing the security of new protocols [5]. For this reason, our prototype generates Rust code, with parsers using the nom parser combinator library [6].…”
Section: Parser Generatorsmentioning
confidence: 99%
“…A possible angle to address this problem is to rely on development-stage abstractions providing secure constructs, such as parser generators and parser combinators [7,20,28]. While effective, such solutions are only applicable to software for which the source code is available.…”
Section: Introductionmentioning
confidence: 99%