Many high-level functional programming languages are compiled to or interoperate with, low-level languages such as C and assembly. Research into the security of these compilation and interoperation mechanisms often makes use of high-level attacker models to simplify formalisations. In practice, however, the validity of such high-level attacker models is frequently called into question. In this paper we formally prove that a light-weight ML equipped with a reflection operator can serve as an accurate model for malicious assembly language programs, when reasoning about the security threats such an attacker model poses to the abstractions of ML programs that reside within a protected memory space. The proof proceeds by relating bisimulations over the assembly language attacker and the high-level attacker.

A High-Level Model for an Assembly Language Attacker by Means of Reflection / Larmuseau, Adriaan; Patrignani, Marco; Clarke, Dave. - 9409:(2015), pp. 168-182. ( 1st International Symposium on Dependable Software Engineering: Theories, Tools, and Applications, SETTA 2015 Nanjing, China, November4-6, 2015,) [10.1007/978-3-319-25942-0_11].

A High-Level Model for an Assembly Language Attacker by Means of Reflection

Patrignani , Marco;
2015-01-01

Abstract

Many high-level functional programming languages are compiled to or interoperate with, low-level languages such as C and assembly. Research into the security of these compilation and interoperation mechanisms often makes use of high-level attacker models to simplify formalisations. In practice, however, the validity of such high-level attacker models is frequently called into question. In this paper we formally prove that a light-weight ML equipped with a reflection operator can serve as an accurate model for malicious assembly language programs, when reasoning about the security threats such an attacker model poses to the abstractions of ML programs that reside within a protected memory space. The proof proceeds by relating bisimulations over the assembly language attacker and the high-level attacker.
2015
Dependable Software Engineering: Theories, Tools, and Applications- First International Symposium, {SETTA} 2015, Nanjing, China, November4-6, 2015, Proceedings
GEWERBESTRASSE 11, CHAM, CH-6330, SWITZERLAND
Springer
9783319259413
Larmuseau, Adriaan; Patrignani, Marco; Clarke, Dave
A High-Level Model for an Assembly Language Attacker by Means of Reflection / Larmuseau, Adriaan; Patrignani, Marco; Clarke, Dave. - 9409:(2015), pp. 168-182. ( 1st International Symposium on Dependable Software Engineering: Theories, Tools, and Applications, SETTA 2015 Nanjing, China, November4-6, 2015,) [10.1007/978-3-319-25942-0_11].
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11572/336499
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 0
  • OpenAlex ND
social impact