Towards Practical Taint Tracking

This paper proposes several technical measures that significantly improve performance and largely limit kernel taint explosion in a XENand QEMU-based taint

[1]  Jason Flinn,et al.  Parallelizing security checks on commodity hardware , 2008, ASPLOS.

[2]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.

[3]  Olatunji Ruwase,et al.  Parallelizing dynamic information flow tracking , 2008, SPAA '08.

[4]  Yuanyuan Zhou,et al.  Sweeper: a lightweight end-to-end system for defending against fast worms , 2007, EuroSys '07.

[5]  Peter J. Denning,et al.  Certification of programs for secure information flow , 1977, CACM.

[6]  Andrew C. Myers,et al.  JFlow: practical mostly-static information flow control , 1999, POPL '99.

[7]  Andrew Warfield,et al.  Practical taint-based protection using demand emulation , 2006, EuroSys.

[8]  Andrew S. Tanenbaum,et al.  A Virtual Machine Based Information Flow Control System for Policy Enforcement , 2008, Electron. Notes Theor. Comput. Sci..

[9]  Qing Zhang,et al.  Neon: system support for derived data management , 2010, VEE '10.

[10]  Heng Yin,et al.  Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.

[11]  James Newsome,et al.  Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.

[12]  Christoforos E. Kozyrakis,et al.  Tainting is not pointless , 2010, OPSR.

[13]  Xi Wang,et al.  Improving application security with data flow assertions , 2009, SOSP '09.

[14]  Eddie Kohler,et al.  Making information flow explicit in HiStar , 2006, OSDI '06.

[15]  Herbert Bos,et al.  Pointless tainting?: evaluating the practicality of pointer tainting , 2009, EuroSys '09.

[16]  Andrew C. Myers,et al.  A decentralized model for information flow control , 1997, SOSP.

[17]  Christoforos E. Kozyrakis,et al.  Hardware Enforcement of Application Security Policies Using Tagged Memory , 2008, OSDI.

[18]  Tal Garfinkel,et al.  Understanding data lifetime via whole system simulation , 2004 .