征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

The Third Workshop on Language-Theoretic Security (LangSec) at the IEEE CS Security & Privacy Workshops solicits contributions related to the growing area of language-theoretic security. The workshop's preliminary program has been posted. LangSec's goal is to provide the strongest defense for connected software and hardware, expressed as a practical design methodology for handling hostile inputs. LangSec offers a coherent computer science explanation for the current "epidemic of insecurity" and imposes an easy-to-understand structure on the seemingly ad hoc collection of software mistakes or design flaws. This explanation is predicated on the connection between fundamental computability principles and the continued recurrence of software flaws despite numerous and diverse secure programming initiatives. LangSec posits that the only path to trustworthy software that safely handles untrusted inputs is treating all valid or expected inputs as a formal language and treating the respective input-handling routines as a recognizer for that language. However, far from being an "Ivory Tower" theory, the LangSec approach to systems design is primarily concerned with achieving practical assurance: development that is rooted in fundamentally sound theory, but is expressed in efficient and practical tools for building software. One major objective of the workshop is to develop and share this viewpoint with attendees and the broader systems security community, to help establish a foundation for research based on LangSec principles. The overall goal of the workshop is to bring more clarity and focus to two complementary areas: (1) practical software assurance and (2) vulnerability analysis (identification, characterization, and exploit development). The LangSec community views these activities as related and highly structured engineering disciplines and seeks to provide a forum to explore and develop this relationship.

征稿信息

征稿范围

Research papers are encouraged to address some of the topics listed below, but the list is not exhaustive:
1. formalization of vulnerabilities and exploits in terms of language theory
2. science of protocol design: layering, fragmentation and re-assembly, extensibility, etc
3. architectural constructs for enforcing limits on computational complexity
4. empirical data on programming language features/programming styles that affect bug introduction rates
(e.g., syntactic redundancy)
5. systems architectures and designs based on LangSec principles
6. computer languages, file formats, and network protocols built on LangSec principles
7. re-engineering efforts of existing languages, formats, and protocols to reduce computational power
8. novel system designs for isolation and separation of parsers and processing
9. exploit programming as an engineering discipline
10. structured techniques for building weird machines
11. systems and frameworks for post-hoc or design time recognizer definition
12. identification of LangSec anti-patterns; certification of absence
13. type safety; efficient runtime type checking
14. small languages
15. parser generators
16. embedding runtime language recognizers
17. methods and techniques for practical assurance
18. parser proof-of-equivalence in distributed systems
19. LangSec case studies of successes and failures
20. comprehensive taxonomies of LangSec phenomena
21. measurement studies of LangSec systems or data sets
22. type theory
23. models for unexpected computation
24. modeling computational substrates

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 05月26日

    2016

    会议日期

  • 05月26日 2016

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询