TaintEraser: protecting sensitive data leaks using application-level taint tracking
暂无分享,去创建一个
Dawn Xiaodong Song | David Wetherall | Tadayoshi Kohno | Jaeyeon Jung | David Zhu | D. Song | D. Wetherall | Jaeyeon Jung | T. Kohno | David Zhu | Tadayoshi Kohno
[1] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[2] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[3] Guilherme Ottoni,et al. RIFLE: An Architectural Framework for User-Centric Information-Flow Security , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[4] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[5] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[6] Steve Vandebogart,et al. Labels and event processes in the Asbestos operating system , 2005, TOCS.
[7] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[8] Cheng Wang,et al. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).
[9] Robert Biddle,et al. A Usability Study and Critique of Two Password Managers , 2006, USENIX Security Symposium.
[10] Andrew Warfield,et al. Practical taint-based protection using demand emulation , 2006, EuroSys.
[11] Bei Yu,et al. TaintTrace: Efficient Flow Tracing with Dynamic Binary Rewriting , 2006, 11th IEEE Symposium on Computers and Communications (ISCC'06).
[12] Wei Xu,et al. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks , 2006, USENIX Security Symposium.
[13] Eddie Kohler,et al. Making information flow explicit in HiStar , 2006, OSDI '06.
[14] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[15] Alessandro Orso,et al. Dytan: a generic dynamic taint analysis framework , 2007, ISSTA '07.
[16] Cheng Wang,et al. StarDBT: An Efficient Multi-platform Dynamic Binary Translation System , 2007, Asia-Pacific Computer Systems Architecture Conference.
[17] Landon P. Cox,et al. TightLip: Keeping Applications from Spilling the Beans , 2007, NSDI.
[18] Bruce Schneier,et al. Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications , 2008, HotSec.
[19] Dynamic Information Flow Tracking on Multicores , 2008 .
[20] David Wetherall,et al. Privacy oracle: a system for finding application leaks with black box differential testing , 2008, CCS.
[21] R. Sekar,et al. Efficient fine-grained binary instrumentationwith applications to taint-tracking , 2008, CGO '08.
[22] Ninghui Li,et al. PRECIP: Towards Practical and Retrofittable Confidential Information Protection , 2008, NDSS.
[23] Derek Bruening,et al. Process-shared and persistent code caches , 2008, VEE '08.
[24] Herbert Bos,et al. Pointless tainting?: evaluating the practicality of pointer tainting , 2009, EuroSys '09.
[25] Stephen McCamant,et al. Measuring channel capacity to distinguish undue influence , 2009, PLAS '09.
[26] Christoforos E. Kozyrakis,et al. Tainting is not pointless , 2010, OPSR.
[27] David Brumley,et al. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) , 2010, 2010 IEEE Symposium on Security and Privacy.