Show simple item record

dc.contributor.authorChen, Haogang
dc.contributor.authorCutler, Cody
dc.contributor.authorKim, Taesoo
dc.contributor.authorMao, Yandong
dc.contributor.authorWang, Xi
dc.contributor.authorZeldovich, Nickolai
dc.contributor.authorKaashoek, M. Frans
dc.date.accessioned2014-05-09T13:12:29Z
dc.date.available2014-05-09T13:12:29Z
dc.date.issued2013-07
dc.identifier.isbn9781450323161
dc.identifier.urihttp://hdl.handle.net/1721.1/86887
dc.description.abstractBecause embedded interpreters offer flexibility and performance, they are becoming more prevalent, and can be found at nearly every level of the software stack. As one example, the Linux kernel defines languages to describe packet filtering rules and uses embedded interpreters to filter packets at run time. As another example, the RAR archive format allows embedding bytecode in compressed files to describe reversible transformations for decompression. This paper presents an analysis of common pitfalls in embedded interpreter implementations, which can lead to security vulnerabilities, and their impact. We hope that these results are useful both in augmenting existing embedded interpreters and in aiding developers in building new, more secure embedded interpreters.en_US
dc.description.sponsorshipUnited States. Defense Advanced Research Projects Agency. Clean-slate design of Resilient, Adaptive, Secure Hosts (Contract N66001-10-2-4089)en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (Award CNS-1053143)en_US
dc.language.isoen_US
dc.publisherEdition Open Accessen_US
dc.relation.isversionofhttp://dx.doi.org/10.1145/2500727.2500747en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceMIT web domainen_US
dc.titleSecurity bugs in embedded interpretersen_US
dc.typeArticleen_US
dc.identifier.citationHaogang Chen, Cody Cutler, Taesoo Kim, Yandong Mao, Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek. 2013. Security bugs in embedded interpreters. In Proceedings of the 4th Asia-Pacific Workshop on Systems (APSys '13). ACM, New York, NY, USA, Article 17, 7 pages.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorChen, Haogangen_US
dc.contributor.mitauthorCutler, Codyen_US
dc.contributor.mitauthorKim, Taesooen_US
dc.contributor.mitauthorMao, Yandongen_US
dc.contributor.mitauthorWang, Xien_US
dc.contributor.mitauthorZeldovich, Nickolaien_US
dc.contributor.mitauthorKaashoek, M. Fransen_US
dc.relation.journalProceedings of the 4th Asia-Pacific Workshop on Systems (APSys '13)en_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dspace.orderedauthorsChen, Haogang; Cutler, Cody; Kim, Taesoo; Mao, Yandong; Wang, Xi; Zeldovich, Nickolai; Kaashoek, M. Fransen_US
dc.identifier.orcidhttps://orcid.org/0000-0003-0238-2703
dc.identifier.orcidhttps://orcid.org/0000-0002-2898-1686
dc.identifier.orcidhttps://orcid.org/0000-0002-2942-9981
dc.identifier.orcidhttps://orcid.org/0000-0001-7098-586X
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record