<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Xiaodog1234</id>
	<title>Soma-notes - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Xiaodog1234"/>
	<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php/Special:Contributions/Xiaodog1234"/>
	<updated>2026-04-05T02:14:03Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.42.1</generator>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_21&amp;diff=20902</id>
		<title>SystemsSec 2016W Lecture 21</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_21&amp;diff=20902"/>
		<updated>2016-03-31T23:08:25Z</updated>

		<summary type="html">&lt;p&gt;Xiaodog1234: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Exam:&lt;br /&gt;
    - Similar format to Midterm&lt;br /&gt;
    - can bring laptop, Open book/laptop&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Program Anaylsis&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
- Problem address&lt;br /&gt;
	- not clear on what they do&lt;br /&gt;
	- most technique do not scale to real world program&lt;br /&gt;
	- reference to covariety&lt;br /&gt;
		- company product for analyzing program for software flaws particular to security&lt;br /&gt;
			- one person co author of this paper&lt;br /&gt;
&lt;br /&gt;
	- twist under constrained?&lt;br /&gt;
	- fundamental problem of program analysis?&lt;br /&gt;
		false positive&lt;br /&gt;
		- cant do perfect analysis on program that scale&lt;br /&gt;
			- need to number of assumption&lt;br /&gt;
				- hav to assume things pessimisstically&lt;br /&gt;
				- get report of all that this could b bad&lt;br /&gt;
				- programmer wont look at this &lt;br /&gt;
		- how to give programmer context &lt;br /&gt;
	- using approach that increase false postive&lt;br /&gt;
		- input output nicely set&lt;br /&gt;
		- but if jump in the middle of the program who knows what it does&lt;br /&gt;
			***- no way to know if all precondition has been met&lt;br /&gt;
				- so how is this at all a good idea?&lt;br /&gt;
				&lt;br /&gt;
		- how did they save themselve?&lt;br /&gt;
			- liquid type inference&lt;br /&gt;
				- infer constraint onto the data as it goes through the program&lt;br /&gt;
				- if the program behaves like this here, it must be this state or that state&lt;br /&gt;
					- one technique they use&lt;br /&gt;
	 		- lets jump into middle of program &lt;br /&gt;
				- not try to analyize the program&lt;br /&gt;
				- annotation &lt;br /&gt;
					- SSL: false positive when looking at R2 data&lt;br /&gt;
						- start in middle of program assume everyfine and see how it goes&lt;br /&gt;
						- but limited constraint in it to reduce problem size&lt;br /&gt;
&lt;br /&gt;
						- only allow this to run in a hour&lt;br /&gt;
							- relatively fast&lt;br /&gt;
			- why do this? because if start at beginning can&#039;t reach to alot of parts because of constraint&lt;br /&gt;
				- solution we just gonna jump there&lt;br /&gt;
				- analyzing the program, symbolically executing, symbolic execution, &lt;br /&gt;
				EX: kinda like java eclipse where you set debugging point&lt;br /&gt;
					&lt;br /&gt;
			- underconstraint&lt;br /&gt;
				- pro get to some point that u may never get there&lt;br /&gt;
			with Patch	&lt;br /&gt;
				- is there differiential crash? so can compare nd see if the patch did something bad &lt;br /&gt;
&lt;br /&gt;
				why want to look at Patch this way?&lt;br /&gt;
					- why patch nasty &lt;br /&gt;
						- when u doing a patch	&lt;br /&gt;
						- when something&#039;s broken, already deployed, might b code thats sitting around for years&lt;br /&gt;
							- potentially no one &lt;br /&gt;
							- can u get it right? Kinda of? ish?&lt;br /&gt;
								- as person doing patch not same level of understanding to previous owner&lt;br /&gt;
					- impact of the bug from security attack?&lt;br /&gt;
						- not likely as there are various security stuff that could cover it&lt;br /&gt;
						- not worth the spent resource look for this vs updating security&lt;br /&gt;
&lt;br /&gt;
			-if went to program analysis conference &lt;br /&gt;
				- laugh out of the room&lt;br /&gt;
				- timeline of paper is funny, paper they used were years ago, major gap in publication&lt;br /&gt;
					- could have been previously rejected by sub community - program analysis - and dumped to security community &lt;br /&gt;
					- as a security paper&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WebEval&#039;&#039;&#039;    &lt;br /&gt;
    - malicious extension detector, &lt;br /&gt;
	- one statistic that horrifying&lt;br /&gt;
		- 10% of whole&lt;br /&gt;
			- only 95% are accurate&lt;br /&gt;
&lt;br /&gt;
major security problem&lt;br /&gt;
	- nothing on the user end that can counter act &lt;br /&gt;
		- why are we downloading extension?&lt;br /&gt;
			- added functionality&lt;br /&gt;
&lt;br /&gt;
		&lt;br /&gt;
			- security restriction of web broswer is too limiting &lt;br /&gt;
			- by installing extension means I WISH TO BREAK SECURITY POLICY&lt;br /&gt;
&lt;br /&gt;
			-  what happen to web if give developer the permission they want&lt;br /&gt;
	&lt;br /&gt;
				- bad things get distributed&lt;br /&gt;
	&lt;br /&gt;
		- chrome extensions to prevent this&lt;br /&gt;
			- key things to have : permission model, &lt;br /&gt;
				- but developer give more permission first and then as they work on it they scale it&lt;br /&gt;
				&lt;br /&gt;
			- set up the problem so that people could be sending our data at all time&lt;br /&gt;
				- so what are we doing to handle this issue?&lt;br /&gt;
					&lt;br /&gt;
				- keep list of behaviour of malicious extension&lt;br /&gt;
				- binary classification - two set good or bad and try to classifier &lt;br /&gt;
&lt;br /&gt;
					- human used when high entropy from the classification &lt;br /&gt;
&lt;br /&gt;
				&lt;br /&gt;
			automated system can be get around &lt;br /&gt;
				- change the code, until it gets passed this to get around the restriction &lt;br /&gt;
				- evade the classification rule that are impelemented&lt;br /&gt;
				- so only way to find this is to use humans&lt;br /&gt;
				- classical problem of binary classification&lt;/div&gt;</summary>
		<author><name>Xiaodog1234</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_21&amp;diff=20901</id>
		<title>SystemsSec 2016W Lecture 21</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_21&amp;diff=20901"/>
		<updated>2016-03-31T23:07:56Z</updated>

		<summary type="html">&lt;p&gt;Xiaodog1234: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Exam:&lt;br /&gt;
    - Similar format to Midterm&lt;br /&gt;
    - can bring laptop, Open book/laptop&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Program Anaylsis&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
- Problem address&lt;br /&gt;
	- not clear on what they do&lt;br /&gt;
	- most technique do not scale to real world program&lt;br /&gt;
	- reference to covariety&lt;br /&gt;
		- company product for analyzing program for software flaws particular to security&lt;br /&gt;
			- one person co author of this paper&lt;br /&gt;
&lt;br /&gt;
	- twist under constrained?&lt;br /&gt;
	- fundamental problem of program analysis?&lt;br /&gt;
		false positive&lt;br /&gt;
		- cant do perfect analysis on program that scale&lt;br /&gt;
			- need to number of assumption&lt;br /&gt;
				- hav to assume things pessimisstically&lt;br /&gt;
				- get report of all that this could b bad&lt;br /&gt;
				- programmer wont look at this &lt;br /&gt;
		- how to give programmer context &lt;br /&gt;
	- using approach that increase false postive&lt;br /&gt;
		- input output nicely set&lt;br /&gt;
		- but if jump in the middle of the program who knows what it does&lt;br /&gt;
			***- no way to know if all precondition has been met&lt;br /&gt;
				- so how is this at all a good idea?&lt;br /&gt;
				&lt;br /&gt;
		- how did they save themselve?&lt;br /&gt;
			- liquid type inference&lt;br /&gt;
				- infer constraint onto the data as it goes through the program&lt;br /&gt;
				- if the program behaves like this here, it must be this state or that state&lt;br /&gt;
					- one technique they use&lt;br /&gt;
	 		- lets jump into middle of program &lt;br /&gt;
				- not try to analyize the program&lt;br /&gt;
				- annotation &lt;br /&gt;
					- SSL: false positive when looking at R2 data&lt;br /&gt;
						- start in middle of program assume everyfine and see how it goes&lt;br /&gt;
						- but limited constraint in it to reduce problem size&lt;br /&gt;
&lt;br /&gt;
						- only allow this to run in a hour&lt;br /&gt;
							- relatively fast&lt;br /&gt;
			- why do this? because if start at beginning can&#039;t reach to alot of parts because of constraint&lt;br /&gt;
				- solution we just gonna jump there&lt;br /&gt;
				- analyzing the program, symbolically executing, symbolic execution, &lt;br /&gt;
				EX: kinda like java eclipse where you set debugging point&lt;br /&gt;
					&lt;br /&gt;
			- underconstraint&lt;br /&gt;
				- pro get to some point that u may never get there&lt;br /&gt;
			with Patch	&lt;br /&gt;
				- is there differiential crash? so can compare nd see if the patch did something bad &lt;br /&gt;
&lt;br /&gt;
				why want to look at Patch this way?&lt;br /&gt;
					- why patch nasty &lt;br /&gt;
						- when u doing a patch	&lt;br /&gt;
						- when something&#039;s broken, already deployed, might b code thats sitting around for years&lt;br /&gt;
							- potentially no one &lt;br /&gt;
							- can u get it right? Kinda of? ish?&lt;br /&gt;
								- as person doing patch not same level of understanding to previous owner&lt;br /&gt;
					- impact of the bug from security attack?&lt;br /&gt;
						- not likely as there are various security stuff that could cover it&lt;br /&gt;
						- not worth the spent resource look for this vs updating security&lt;br /&gt;
&lt;br /&gt;
			-if went to program analysis conference &lt;br /&gt;
				- laugh out of the room&lt;br /&gt;
				- timeline of paper is funny, paper they used were years ago, major gap in publication&lt;br /&gt;
					- could have been previously rejected by sub community - program analysis - and dumped to security community &lt;br /&gt;
					- as a security paper&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WebEval&#039;&#039;&#039;&lt;br /&gt;
    &lt;br /&gt;
    - malicious extension detector, &lt;br /&gt;
	- one statistic that horrifying&lt;br /&gt;
		- 10% of whole&lt;br /&gt;
			- only 95% are accurate&lt;br /&gt;
&lt;br /&gt;
major security problem&lt;br /&gt;
	- nothing on the user end that can counter act &lt;br /&gt;
		- why are we downloading extension?&lt;br /&gt;
			- added functionality&lt;br /&gt;
&lt;br /&gt;
		&lt;br /&gt;
			- security restriction of web broswer is too limiting &lt;br /&gt;
			- by installing extension means I WISH TO BREAK SECURITY POLICY&lt;br /&gt;
&lt;br /&gt;
			-  what happen to web if give developer the permission they want&lt;br /&gt;
	&lt;br /&gt;
				- bad things get distributed&lt;br /&gt;
	&lt;br /&gt;
		- chrome extensions to prevent this&lt;br /&gt;
			- key things to have : permission model, &lt;br /&gt;
				- but developer give more permission first and then as they work on it they scale it&lt;br /&gt;
				&lt;br /&gt;
			- set up the problem so that people could be sending our data at all time&lt;br /&gt;
				- so what are we doing to handle this issue?&lt;br /&gt;
					&lt;br /&gt;
				- keep list of behaviour of malicious extension&lt;br /&gt;
				- binary classification - two set good or bad and try to classifier &lt;br /&gt;
&lt;br /&gt;
					- human used when high entropy from the classification &lt;br /&gt;
&lt;br /&gt;
				&lt;br /&gt;
			automated system can be get around &lt;br /&gt;
				- change the code, until it gets passed this to get around the restriction &lt;br /&gt;
				- evade the classification rule that are impelemented&lt;br /&gt;
				- so only way to find this is to use humans&lt;br /&gt;
				- classical problem of binary classification&lt;/div&gt;</summary>
		<author><name>Xiaodog1234</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_21&amp;diff=20900</id>
		<title>SystemsSec 2016W Lecture 21</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_21&amp;diff=20900"/>
		<updated>2016-03-31T23:07:33Z</updated>

		<summary type="html">&lt;p&gt;Xiaodog1234: March 29 notes dump&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Exam:&lt;br /&gt;
    - Similar format to Midterm&lt;br /&gt;
    - can bring laptop, Open book/laptop&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Program Anaylsis&#039;&#039;&#039;&lt;br /&gt;
  &lt;br /&gt;
   Problem address&lt;br /&gt;
	- not clear on what they do&lt;br /&gt;
	- most technique do not scale to real world program&lt;br /&gt;
	- reference to covariety&lt;br /&gt;
		- company product for analyzing program for software flaws particular to security&lt;br /&gt;
			- one person co author of this paper&lt;br /&gt;
&lt;br /&gt;
	- twist under constrained?&lt;br /&gt;
	- fundamental problem of program analysis?&lt;br /&gt;
		false positive&lt;br /&gt;
		- cant do perfect analysis on program that scale&lt;br /&gt;
			- need to number of assumption&lt;br /&gt;
				- hav to assume things pessimisstically&lt;br /&gt;
				- get report of all that this could b bad&lt;br /&gt;
				- programmer wont look at this &lt;br /&gt;
		- how to give programmer context &lt;br /&gt;
	- using approach that increase false postive&lt;br /&gt;
		- input output nicely set&lt;br /&gt;
		- but if jump in the middle of the program who knows what it does&lt;br /&gt;
			***- no way to know if all precondition has been met&lt;br /&gt;
				- so how is this at all a good idea?&lt;br /&gt;
				&lt;br /&gt;
		- how did they save themselve?&lt;br /&gt;
			- liquid type inference&lt;br /&gt;
				- infer constraint onto the data as it goes through the program&lt;br /&gt;
				- if the program behaves like this here, it must be this state or that state&lt;br /&gt;
					- one technique they use&lt;br /&gt;
	 		- lets jump into middle of program &lt;br /&gt;
				- not try to analyize the program&lt;br /&gt;
				- annotation &lt;br /&gt;
					- SSL: false positive when looking at R2 data&lt;br /&gt;
						- start in middle of program assume everyfine and see how it goes&lt;br /&gt;
						- but limited constraint in it to reduce problem size&lt;br /&gt;
&lt;br /&gt;
						- only allow this to run in a hour&lt;br /&gt;
							- relatively fast&lt;br /&gt;
			- why do this? because if start at beginning can&#039;t reach to alot of parts because of constraint&lt;br /&gt;
				- solution we just gonna jump there&lt;br /&gt;
				- analyzing the program, symbolically executing, symbolic execution, &lt;br /&gt;
				EX: kinda like java eclipse where you set debugging point&lt;br /&gt;
					&lt;br /&gt;
			- underconstraint&lt;br /&gt;
				- pro get to some point that u may never get there&lt;br /&gt;
			with Patch	&lt;br /&gt;
				- is there differiential crash? so can compare nd see if the patch did something bad &lt;br /&gt;
&lt;br /&gt;
				why want to look at Patch this way?&lt;br /&gt;
					- why patch nasty &lt;br /&gt;
						- when u doing a patch	&lt;br /&gt;
						- when something&#039;s broken, already deployed, might b code thats sitting around for years&lt;br /&gt;
							- potentially no one &lt;br /&gt;
							- can u get it right? Kinda of? ish?&lt;br /&gt;
								- as person doing patch not same level of understanding to previous owner&lt;br /&gt;
					- impact of the bug from security attack?&lt;br /&gt;
						- not likely as there are various security stuff that could cover it&lt;br /&gt;
						- not worth the spent resource look for this vs updating security&lt;br /&gt;
&lt;br /&gt;
			-if went to program analysis conference &lt;br /&gt;
				- laugh out of the room&lt;br /&gt;
				- timeline of paper is funny, paper they used were years ago, major gap in publication&lt;br /&gt;
					- could have been previously rejected by sub community - program analysis - and dumped to security community &lt;br /&gt;
					- as a security paper&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WebEval&#039;&#039;&#039;&lt;br /&gt;
    &lt;br /&gt;
    - malicious extension detector, &lt;br /&gt;
	- one statistic that horrifying&lt;br /&gt;
		- 10% of whole&lt;br /&gt;
			- only 95% are accurate&lt;br /&gt;
&lt;br /&gt;
major security problem&lt;br /&gt;
	- nothing on the user end that can counter act &lt;br /&gt;
		- why are we downloading extension?&lt;br /&gt;
			- added functionality&lt;br /&gt;
&lt;br /&gt;
		&lt;br /&gt;
			- security restriction of web broswer is too limiting &lt;br /&gt;
			- by installing extension means I WISH TO BREAK SECURITY POLICY&lt;br /&gt;
&lt;br /&gt;
			-  what happen to web if give developer the permission they want&lt;br /&gt;
	&lt;br /&gt;
				- bad things get distributed&lt;br /&gt;
	&lt;br /&gt;
		- chrome extensions to prevent this&lt;br /&gt;
			- key things to have : permission model, &lt;br /&gt;
				- but developer give more permission first and then as they work on it they scale it&lt;br /&gt;
				&lt;br /&gt;
			- set up the problem so that people could be sending our data at all time&lt;br /&gt;
				- so what are we doing to handle this issue?&lt;br /&gt;
					&lt;br /&gt;
				- keep list of behaviour of malicious extension&lt;br /&gt;
				- binary classification - two set good or bad and try to classifier &lt;br /&gt;
&lt;br /&gt;
					- human used when high entropy from the classification &lt;br /&gt;
&lt;br /&gt;
				&lt;br /&gt;
			automated system can be get around &lt;br /&gt;
				- change the code, until it gets passed this to get around the restriction &lt;br /&gt;
				- evade the classification rule that are impelemented&lt;br /&gt;
				- so only way to find this is to use humans&lt;br /&gt;
				- classical problem of binary classification&lt;/div&gt;</summary>
		<author><name>Xiaodog1234</name></author>
	</entry>
</feed>