Skip to main content

Showing 1–5 of 5 results for author: Thielecke, H

Searching in archive cs. Search in all archives.
.
  1. Command injection attacks, continuations, and the Lambek calculus

    Authors: Hayo Thielecke

    Abstract: This paper shows connections between command injection attacks, continuations, and the Lambek calculus: certain command injections, such as the tautology attack on SQL, are shown to be a form of control effect that can be typed using the Lambek calculus, generalizing the double-negation typing of continuations. Lambek's syntactic calculus is a logic with two implicational connectives taking their… ▽ More

    Submitted 20 June, 2016; originally announced June 2016.

    Comments: In Proceedings WoC 2015, arXiv:1606.05839

    ACM Class: D.3.3, D.4.6; F.3.3, F.4.2

    Journal ref: EPTCS 212, 2016, pp. 81-96

  2. arXiv:1405.7058  [pdf, ps, other

    cs.PL cs.LO

    Static Analysis for Regular Expression Exponential Runtime via Substructural Logics (Extended)

    Authors: Asiri Rathnayake, Hayo Thielecke

    Abstract: Regular expression matching using backtracking can have exponential runtime, leading to an algorithmic complexity attack known as REDoS in the systems security literature. In this paper, we build on a recently published static analysis that detects whether a given regular expression can have exponential runtime for some inputs. We systematically construct a more accurate analysis by forming powers… ▽ More

    Submitted 13 August, 2017; v1 submitted 27 May, 2014; originally announced May 2014.

    Comments: Extended version with a sketch of the completeness proof - work in progress

  3. arXiv:1301.0849  [pdf, ps, other

    cs.PL cs.CR

    Static Analysis for Regular Expression Denial-of-Service Attacks

    Authors: James Kirrage, Asiri Rathnayake, Hayo Thielecke

    Abstract: Regular expressions are a concise yet expressive language for expressing patterns. For instance, in networked software, they are used for input validation and intrusion detection. Yet some widely deployed regular expression matchers based on backtracking are themselves vulnerable to denial-of-service attacks, since their runtime can be exponential for certain input strings. This paper presents a s… ▽ More

    Submitted 4 January, 2013; originally announced January 2013.

  4. Operational semantics for signal handling

    Authors: Maxim Strygin, Hayo Thielecke

    Abstract: Signals are a lightweight form of interprocess communication in Unix. When a process receives a signal, the control flow is interrupted and a previously installed signal handler is run. Signal handling is reminiscent both of exception handling and concurrent interleaving of processes. In this paper, we investigate different approaches to formalizing signal handling in operational semantics, and co… ▽ More

    Submitted 13 August, 2012; originally announced August 2012.

    Comments: In Proceedings EXPRESS/SOS 2012, arXiv:1208.2440

    ACM Class: D.3.1; D.3.3

    Journal ref: EPTCS 89, 2012, pp. 149-163

  5. Regular Expression Matching and Operational Semantics

    Authors: Asiri Rathnayake, Hayo Thielecke

    Abstract: Many programming languages and tools, ranging from grep to the Java String library, contain regular expression matchers. Rather than first translating a regular expression into a deterministic finite automaton, such implementations typically match the regular expression on the fly. Thus they can be seen as virtual machines interpreting the regular expression much as if it were a program with some… ▽ More

    Submitted 15 August, 2011; originally announced August 2011.

    Comments: In Proceedings SOS 2011, arXiv:1108.2796

    Journal ref: EPTCS 62, 2011, pp. 31-45