A High-Level Model for an Assembly Language Attacker by Means of Reflection

نویسندگان

  • Adriaan Larmuseau
  • Marco Patrignani
  • Dave Clarke
چکیده

Many high-level functional programming languages are compiled to or interoperate with, low-level languages such as C and assembly. Research into the security of these compilation and interoperation mechanisms often makes use of high-level attacker models to simplify formalisations. In practice, however, the validity of such high-level attacker models is frequently called into question. In this paper we formally prove that a light-weight ML equipped with a reflection operator can serve as an accurate model for malicious assembly language programs, when reasoning about the security threats such an attacker model poses to the abstractions of ML programs that reside within a protected memory space. The proof proceeds by relating bisimulations over the assembly language attacker and the high-level attacker.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Formalizing a Secure Foreign Function Interface

Many high-level functional programming languages provide programmers with the ability to interoperate with untyped and lowlevel languages such as C and assembly. Research into the security of such interoperation has generally focused on a closed world scenario, one where both the high-level and low-level code are defined and analyzed statically. In practice, however, components are sometimes li...

متن کامل

The Use of Self-Repair Strategies in Classroom Conversations: Does the Teacher’s Level of Reflection Make a Difference?

To better understand the pattern of language use and classroom interactions, this sequential mixed-methods study investigated the teachers’ use of self-repair strategies based on their level of reflection. To this end, 33 Iranian EFL teachers were selected from various institutions in Tehran. Data for the quantitative phase were collected from the reflectivity questionnaire developed by Akbari,...

متن کامل

A Three-Level Mathematical Model for an r-interdiction Hierarchical Facilities Location Problem

In general, any system may be at risk in a case of losing the critical facilities by natural disasters or terrorist attacks. This paper focuses on identifying the critical facilities and planning to reduce the effect of this event. A three-level model is suggested in the form of a defender-attacker-defender. It is assumed that the facilities are hierarchical and capable of nesting. Also, the at...

متن کامل

On the Development of a Model of Cultural Identity and Language Achievement among Iranian Advanced EFL Learners

Culture is an inseparable part of a language. In other words, mastering a language and being able to communicate through it inevitably entails integrating with the culture of the speakers of that language which is the reflection of people's identity. The aim of the present study was designing a model of Iranian cultural identity. Initially, to select a homogeneous sample of learners at the adva...

متن کامل

On the Development of a Model of Cultural Identity and Language Achievement among Iranian Advanced EFL Learners

Culture is an inseparable part of a language. In other words, mastering a language and being able to communicate through it inevitably entails integrating with the culture of the speakers of that language which is the reflection of people's identity. The aim of the present study was designing a model of Iranian cultural identity. Initially, to select a homogeneous sample of learners at the adva...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015