Dytan: a generic dynamic taint analysis framework
Dynamic taint analysis is gaining momentum. Techniques based on dynamic tainting have
been successfully used in the context of application security, and now their use is also being …
been successfully used in the context of application security, and now their use is also being …
Flexitaint: A programmable accelerator for dynamic taint propagation
G Venkataramani, I Doudalis, Y Solihin… - 2008 IEEE 14th …, 2008 - ieeexplore.ieee.org
This paper presents FlexiTaint, a hardware accelerator for dynamic taint propagation.
FlexiTaint is implemented as an in-order addition to the back-end of the processor pipeline …
FlexiTaint is implemented as an in-order addition to the back-end of the processor pipeline …
On the limits of information flow techniques for malware analysis and containment
Taint-tracking is emerging as a general technique in software security to complement
virtualization and static analysis. It has been applied for accurate detection of a wide range …
virtualization and static analysis. It has been applied for accurate detection of a wide range …
Iodine: Fast dynamic taint tracking using rollback-free optimistic hybrid analysis
Dynamic information-flow tracking (DIFT) is useful for enforcing security policies, but rarely
used in practice, as it can slow down a program by an order of magnitude. Static program …
used in practice, as it can slow down a program by an order of magnitude. Static program …
Inputs of coma: Static detection of denial-of-service vulnerabilities
R Chang, G Jiang, F Ivancic… - 2009 22nd IEEE …, 2009 - ieeexplore.ieee.org
As networked systems grow in complexity, they are increasingly vulnerable to denial-of-
service (DoS) attacks involving resource exhaustion. A single malicious" input of coma" can …
service (DoS) attacks involving resource exhaustion. A single malicious" input of coma" can …
UMLsecRT: reactive security monitoring of java applications with round-trip engineering
S Peldszus, J Bürger, J Jürjens - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Today's software systems tend to be long-living and often process security-critical data, so
keeping up with ever-changing security measures, attacks, and mitigations is critical to …
keeping up with ever-changing security measures, attacks, and mitigations is critical to …
Bit-level taint analysis
B Yadegari, S Debray - 2014 IEEE 14th International Working …, 2014 - ieeexplore.ieee.org
Taint analysis has a wide variety of applications in software analysis, making the precision of
taint analysis an important consideration. Current taint analysis algorithms, including …
taint analysis an important consideration. Current taint analysis algorithms, including …
ViaLin: Path-Aware Dynamic Taint Analysis for Android
Dynamic taint analysis-a program analysis technique that checks whether information flows
between particular source and sink locations in the program, has numerous applications in …
between particular source and sink locations in the program, has numerous applications in …
FSAFlow: Lightweight and fast dynamic path tracking and control for privacy protection on Android using hybrid analysis with state-reduction strategy
Z Yang, Z Yuan, S Jin, X Chen, L Sun… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Despite the demonstrated effectiveness of dynamic taint analysis (DTA) in a variety of
security applications, the poor performance achieved by available DTA prototypes prevents …
security applications, the poor performance achieved by available DTA prototypes prevents …
[PDF][PDF] Anti-taint-analysis: Practical evasion techniques against information flow based malware defense
Taint-tracking is emerging as a general technique in software security to complement
virtualization and static analysis. It has been applied for accurate detection of a wide range …
virtualization and static analysis. It has been applied for accurate detection of a wide range …