Dytan: a generic dynamic taint analysis framework

J Clause, W Li, A Orso - … of the 2007 international symposium on …, 2007 - dl.acm.org
Dynamic taint analysis is gaining momentum. Techniques based on dynamic tainting have
been successfully used in the context of application security, and now their use is also being …

Flexitaint: A programmable accelerator for dynamic taint propagation

G Venkataramani, I Doudalis, Y Solihin… - 2008 IEEE 14th …, 2008 - ieeexplore.ieee.org
This paper presents FlexiTaint, a hardware accelerator for dynamic taint propagation.
FlexiTaint is implemented as an in-order addition to the back-end of the processor pipeline …

On the limits of information flow techniques for malware analysis and containment

L Cavallaro, P Saxena, R Sekar - … on Detection of Intrusions and Malware …, 2008 - Springer
Taint-tracking is emerging as a general technique in software security to complement
virtualization and static analysis. It has been applied for accurate detection of a wide range …

Iodine: Fast dynamic taint tracking using rollback-free optimistic hybrid analysis

S Banerjee, D Devecsery, PM Chen… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
Dynamic information-flow tracking (DIFT) is useful for enforcing security policies, but rarely
used in practice, as it can slow down a program by an order of magnitude. Static program …

Inputs of coma: Static detection of denial-of-service vulnerabilities

R Chang, G Jiang, F Ivancic… - 2009 22nd IEEE …, 2009 - ieeexplore.ieee.org
As networked systems grow in complexity, they are increasingly vulnerable to denial-of-
service (DoS) attacks involving resource exhaustion. A single malicious" input of coma" can …

UMLsecRT: reactive security monitoring of java applications with round-trip engineering

S Peldszus, J Bürger, J Jürjens - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Today's software systems tend to be long-living and often process security-critical data, so
keeping up with ever-changing security measures, attacks, and mitigations is critical to …

Bit-level taint analysis

B Yadegari, S Debray - 2014 IEEE 14th International Working …, 2014 - ieeexplore.ieee.org
Taint analysis has a wide variety of applications in software analysis, making the precision of
taint analysis an important consideration. Current taint analysis algorithms, including …

ViaLin: Path-Aware Dynamic Taint Analysis for Android

K Ahmed, Y Wang, M Lis, J Rubin - Proceedings of the 31st ACM Joint …, 2023 - dl.acm.org
Dynamic taint analysis-a program analysis technique that checks whether information flows
between particular source and sink locations in the program, has numerous applications in …

FSAFlow: Lightweight and fast dynamic path tracking and control for privacy protection on Android using hybrid analysis with state-reduction strategy

Z Yang, Z Yuan, S Jin, X Chen, L Sun… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Despite the demonstrated effectiveness of dynamic taint analysis (DTA) in a variety of
security applications, the poor performance achieved by available DTA prototypes prevents …

[PDF][PDF] Anti-taint-analysis: Practical evasion techniques against information flow based malware defense

L Cavallaro, P Saxena, R Sekar - Secure Systems Lab at Stony …, 2007 - researchgate.net
Taint-tracking is emerging as a general technique in software security to complement
virtualization and static analysis. It has been applied for accurate detection of a wide range …