<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://homeostasis.scs.carleton.ca/wiki/index.php?action=history&amp;feed=atom&amp;title=SystemsSec_2016W_Lecture_21</id>
	<title>SystemsSec 2016W Lecture 21 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://homeostasis.scs.carleton.ca/wiki/index.php?action=history&amp;feed=atom&amp;title=SystemsSec_2016W_Lecture_21"/>
	<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_21&amp;action=history"/>
	<updated>2026-04-04T17:45:41Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.42.1</generator>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_21&amp;diff=20902&amp;oldid=prev</id>
		<title>Xiaodog1234 at 23:08, 31 March 2016</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_21&amp;diff=20902&amp;oldid=prev"/>
		<updated>2016-03-31T23:08:25Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 23:08, 31 March 2016&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l69&quot;&gt;Line 69:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 69:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&#039;&#039;&#039;WebEval&#039;&#039;&#039;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&#039;&#039;&#039;WebEval&#039;&#039;&#039; &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;   &lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;    &lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-added&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;     - malicious extension detector,  &lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;     - malicious extension detector,  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;	- one statistic that horrifying&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;	- one statistic that horrifying&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Xiaodog1234</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_21&amp;diff=20901&amp;oldid=prev</id>
		<title>Xiaodog1234 at 23:07, 31 March 2016</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_21&amp;diff=20901&amp;oldid=prev"/>
		<updated>2016-03-31T23:07:56Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 23:07, 31 March 2016&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l5&quot;&gt;Line 5:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 5:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Program Anaylsis&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Program Anaylsis&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;    &lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;    &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;   &lt;/del&gt;Problem address&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;- &lt;/ins&gt;Problem address&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;	- not clear on what they do&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;	- not clear on what they do&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;	- most technique do not scale to real world program&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;	- most technique do not scale to real world program&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Xiaodog1234</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_21&amp;diff=20900&amp;oldid=prev</id>
		<title>Xiaodog1234: March 29 notes dump</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=SystemsSec_2016W_Lecture_21&amp;diff=20900&amp;oldid=prev"/>
		<updated>2016-03-31T23:07:33Z</updated>

		<summary type="html">&lt;p&gt;March 29 notes dump&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Exam:&lt;br /&gt;
    - Similar format to Midterm&lt;br /&gt;
    - can bring laptop, Open book/laptop&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Program Anaylsis&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
  &lt;br /&gt;
   Problem address&lt;br /&gt;
	- not clear on what they do&lt;br /&gt;
	- most technique do not scale to real world program&lt;br /&gt;
	- reference to covariety&lt;br /&gt;
		- company product for analyzing program for software flaws particular to security&lt;br /&gt;
			- one person co author of this paper&lt;br /&gt;
&lt;br /&gt;
	- twist under constrained?&lt;br /&gt;
	- fundamental problem of program analysis?&lt;br /&gt;
		false positive&lt;br /&gt;
		- cant do perfect analysis on program that scale&lt;br /&gt;
			- need to number of assumption&lt;br /&gt;
				- hav to assume things pessimisstically&lt;br /&gt;
				- get report of all that this could b bad&lt;br /&gt;
				- programmer wont look at this &lt;br /&gt;
		- how to give programmer context &lt;br /&gt;
	- using approach that increase false postive&lt;br /&gt;
		- input output nicely set&lt;br /&gt;
		- but if jump in the middle of the program who knows what it does&lt;br /&gt;
			***- no way to know if all precondition has been met&lt;br /&gt;
				- so how is this at all a good idea?&lt;br /&gt;
				&lt;br /&gt;
		- how did they save themselve?&lt;br /&gt;
			- liquid type inference&lt;br /&gt;
				- infer constraint onto the data as it goes through the program&lt;br /&gt;
				- if the program behaves like this here, it must be this state or that state&lt;br /&gt;
					- one technique they use&lt;br /&gt;
	 		- lets jump into middle of program &lt;br /&gt;
				- not try to analyize the program&lt;br /&gt;
				- annotation &lt;br /&gt;
					- SSL: false positive when looking at R2 data&lt;br /&gt;
						- start in middle of program assume everyfine and see how it goes&lt;br /&gt;
						- but limited constraint in it to reduce problem size&lt;br /&gt;
&lt;br /&gt;
						- only allow this to run in a hour&lt;br /&gt;
							- relatively fast&lt;br /&gt;
			- why do this? because if start at beginning can&amp;#039;t reach to alot of parts because of constraint&lt;br /&gt;
				- solution we just gonna jump there&lt;br /&gt;
				- analyzing the program, symbolically executing, symbolic execution, &lt;br /&gt;
				EX: kinda like java eclipse where you set debugging point&lt;br /&gt;
					&lt;br /&gt;
			- underconstraint&lt;br /&gt;
				- pro get to some point that u may never get there&lt;br /&gt;
			with Patch	&lt;br /&gt;
				- is there differiential crash? so can compare nd see if the patch did something bad &lt;br /&gt;
&lt;br /&gt;
				why want to look at Patch this way?&lt;br /&gt;
					- why patch nasty &lt;br /&gt;
						- when u doing a patch	&lt;br /&gt;
						- when something&amp;#039;s broken, already deployed, might b code thats sitting around for years&lt;br /&gt;
							- potentially no one &lt;br /&gt;
							- can u get it right? Kinda of? ish?&lt;br /&gt;
								- as person doing patch not same level of understanding to previous owner&lt;br /&gt;
					- impact of the bug from security attack?&lt;br /&gt;
						- not likely as there are various security stuff that could cover it&lt;br /&gt;
						- not worth the spent resource look for this vs updating security&lt;br /&gt;
&lt;br /&gt;
			-if went to program analysis conference &lt;br /&gt;
				- laugh out of the room&lt;br /&gt;
				- timeline of paper is funny, paper they used were years ago, major gap in publication&lt;br /&gt;
					- could have been previously rejected by sub community - program analysis - and dumped to security community &lt;br /&gt;
					- as a security paper&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;WebEval&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
    &lt;br /&gt;
    - malicious extension detector, &lt;br /&gt;
	- one statistic that horrifying&lt;br /&gt;
		- 10% of whole&lt;br /&gt;
			- only 95% are accurate&lt;br /&gt;
&lt;br /&gt;
major security problem&lt;br /&gt;
	- nothing on the user end that can counter act &lt;br /&gt;
		- why are we downloading extension?&lt;br /&gt;
			- added functionality&lt;br /&gt;
&lt;br /&gt;
		&lt;br /&gt;
			- security restriction of web broswer is too limiting &lt;br /&gt;
			- by installing extension means I WISH TO BREAK SECURITY POLICY&lt;br /&gt;
&lt;br /&gt;
			-  what happen to web if give developer the permission they want&lt;br /&gt;
	&lt;br /&gt;
				- bad things get distributed&lt;br /&gt;
	&lt;br /&gt;
		- chrome extensions to prevent this&lt;br /&gt;
			- key things to have : permission model, &lt;br /&gt;
				- but developer give more permission first and then as they work on it they scale it&lt;br /&gt;
				&lt;br /&gt;
			- set up the problem so that people could be sending our data at all time&lt;br /&gt;
				- so what are we doing to handle this issue?&lt;br /&gt;
					&lt;br /&gt;
				- keep list of behaviour of malicious extension&lt;br /&gt;
				- binary classification - two set good or bad and try to classifier &lt;br /&gt;
&lt;br /&gt;
					- human used when high entropy from the classification &lt;br /&gt;
&lt;br /&gt;
				&lt;br /&gt;
			automated system can be get around &lt;br /&gt;
				- change the code, until it gets passed this to get around the restriction &lt;br /&gt;
				- evade the classification rule that are impelemented&lt;br /&gt;
				- so only way to find this is to use humans&lt;br /&gt;
				- classical problem of binary classification&lt;/div&gt;</summary>
		<author><name>Xiaodog1234</name></author>
	</entry>
</feed>