Dytan: a generic dynamic taint analysis framework
暂无分享,去创建一个
[1] Cheng Wang,et al. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).
[2] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[3] Thomas W. Reps,et al. Analyzing Memory Accesses in x86 Executables , 2004, CC.
[4] Stephen McCamant,et al. Quantitative Information-Flow Tracking for C and Related Languages , 2006 .
[5] Guilherme Ottoni,et al. RIFLE: An Architectural Framework for User-Centric Information-Flow Security , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[6] Intel Corportation,et al. IA-32 Intel Architecture Software Developers Manual , 2004 .
[7] John Wilander,et al. A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention , 2003, NDSS.
[8] Alessandro Orso,et al. Using positive tainting and syntax-aware evaluation to counter SQL injection attacks , 2006, SIGSOFT '06/FSE-14.
[9] Tadeusz Pietraszek,et al. Defending Against Injection Attacks Through Context-Sensitive String Evaluation , 2005, RAID.
[10] Wei Xu,et al. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks , 2006, USENIX Security Symposium.
[11] Anh Nguyen-Tuong,et al. Automatically Hardening Web Applications Using Precise Tainting , 2005, SEC.
[12] Huiyang Zhou,et al. Improving software security via runtime instruction-level taint checking , 2006, ASID '06.
[13] Michael Franz,et al. Dynamic taint propagation for Java , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[14] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[15] François Pottier,et al. Information flow inference for ML , 2003, TOPL.
[16] Bogdan Korel,et al. Forward computation of dynamic program slices , 1994, ISSTA '94.
[17] Cristina Cifuentes,et al. Reverse compilation techniques , 1994 .
[18] Joseph Robert Horgan,et al. Dynamic program slicing , 1990, PLDI '90.
[19] Tim Leek,et al. Coverage Maximization Using Dynamic Taint Tracing , 2007 .
[20] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[21] Tzi-cker Chiueh,et al. A General Dynamic Information Flow Tracking Framework for Security Applications , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[22] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[23] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[24] David Leon,et al. Detecting and debugging insecure information flows , 2004, 15th International Symposium on Software Reliability Engineering.
[25] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.