DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation
暂无分享,去创建一个
Stephen McCamant | Dawn Xiaodong Song | Pongsin Poosankam | Min Gyung Kang | D. Song | Stephen McCamant | Pongsin Poosankam | M. Kang
[1] Zhenkai Liang,et al. BitBlaze: A New Approach to Computer Security via Binary Analysis , 2008, ICISS.
[2] Alessandro Orso,et al. Dytan: a generic dynamic taint analysis framework , 2007, ISSTA '07.
[3] John C. Mitchell,et al. Characterizing Bots' Remote Control Behavior , 2007, DIMVA.
[4] Zhendong Su,et al. On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits , 2005, CCS '05.
[5] Heng Yin,et al. Dynamic Spyware Analysis , 2007, USENIX Annual Technical Conference.
[6] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[7] Scott Shenker,et al. Towards Practical Taint Tracking , 2010 .
[8] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[9] David L. Dill,et al. A Decision Procedure for Bit-Vectors and Arrays , 2007, CAV.
[10] David Brumley,et al. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) , 2010, 2010 IEEE Symposium on Security and Privacy.
[11] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[12] Zhenkai Liang,et al. HookFinder: Identifying and Understanding Malware Hooking Behaviors , 2008, NDSS.
[13] Jeffrey S. Fenton. Information Protection Systems , 1973 .
[14] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[15] Christopher Krügel,et al. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis , 2007, NDSS.
[16] Dorothy E. Denning,et al. Secure information flow in computer systems. , 1975 .
[17] Lisa L Fowler,et al. Practical Data Confinement , 2009 .
[18] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[19] Herbert Bos,et al. Pointless tainting?: evaluating the practicality of pointer tainting , 2009, EuroSys '09.
[20] R. Sekar,et al. On the Limits of Information Flow Techniques for Malware Analysis and Containment , 2008, DIMVA.
[21] Xiangyu Zhang,et al. Strict control dependence and its effect on dynamic information flow analyses , 2010, ISSTA '10.
[22] Stephen McCamant,et al. Loop-extended symbolic execution on binary programs , 2009, ISSTA.
[23] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[24] Manu Sridharan,et al. Thin slicing , 2007, PLDI '07.
[25] Alberto Griggio,et al. A Simple and Flexible Way of Computing Small Unsatisfiable Cores in SAT Modulo Theories , 2007, SAT.
[26] Stephen McCamant,et al. Quantitative information flow as network flow capacity , 2008, PLDI '08.
[27] Steven S. Muchnick,et al. Advanced Compiler Design and Implementation , 1997 .