LangSec Workshop

at IEEE Security & Privacy, May 24, 2018

LangSec Workshop

The Fifth Workshop on Language-Theoretic Security (LangSec) at the IEEE CS Security & Privacy Workshops solicits contributions related to the growing field of language-theoretic security.

In a nutshell, since any software that processes inputs is, in fact, an interpreter, and any inputs are thus its programs, input validation is not essentially different from program verification. To be trustworthy, input validation must therefore be grounded in models that describe precisely what the properties of valid inputs are. Luckily, such models exist, and can be made accessible to regular developers.

The Language-theoretic approach (LangSec) is mission assurance for connected software and hardware exposed to attacks via malicious inputs--through a practical data and code co-design methodology and filtering of legacy formats down to safe subsets.

LangSec regards the Internet insecurity epidemic as a consequence of ad hoc input handling. LangSec posits that the only path to trustworthy software that takes untrusted inputs is treating all valid or expected inputs as a formal language, and treating the respective input-handling routines as a recognizer for that language. Only then can any correctness guarantees be assured for the input-handling code. Ambiguity of message/protocol specification is insecurity; ad hoc parsing is an engine of exploitation; overly complex syntax can make judging security properties of input impractical or even undecidable.

LangSec explains why ad hoc "input sanitization", "sanity checking", and other advice to be more careful with inputs is not enough, and why numerous secure programming initiatives have not ended input-driven exploitation. LangSec is also a code and protocol auditing methodology.

Treating input-handling code as an automaton allows the defender to reason about its behavior. The more limited computational power of the automaton, the easier the reasoning. The root cause of many bugs, memory corruptions, and exploitation is trying to validate inputs with inappropriate automata (e.g., much of XSS is due to "validating" context-free HTML with regexps). The recognizer automaton should be just as powerful as warranted by the message format, and no more; unnecessary complexity is computational power given to the attacker.

The goal of the workshop is to bring more clarity and focus to two complementary areas: (1) practical assurance of input-handling code and (2) analysis of input-related weaknesses, vulnerabilities, and resulting exploitation mechanisms. The LangSec Workshop solicits input on these and related topics from the software verification, programming languages, and offensive research communities.

[Call for Papers] [Submit your work!] (https://www.easychair.org/conferences/?conf=langsec18) (deadline: February 15 2018, 11:59 PM Pacific)

[Workshop flier]

Previous workshops:

[spw14.langsec.org/] (keynoted by Caspar Bowden and Felix 'FX' Lindner)

[spw15.langsec.org/] (keynoted by Dan Geer)

[spw16.langsec.org/] (keynoted by Douglas McIlroy)

[spw17.langsec.org/] (keynoted by Perry Metzger)

Full papers and presentations freely available at the above URLs.

Program Committee:

Organizing Committee: