Towards Practical Taint Tracking
暂无分享,去创建一个
[1] Jason Flinn,et al. Parallelizing security checks on commodity hardware , 2008, ASPLOS.
[2] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[3] Olatunji Ruwase,et al. Parallelizing dynamic information flow tracking , 2008, SPAA '08.
[4] Yuanyuan Zhou,et al. Sweeper: a lightweight end-to-end system for defending against fast worms , 2007, EuroSys '07.
[5] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[6] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[7] Andrew Warfield,et al. Practical taint-based protection using demand emulation , 2006, EuroSys.
[8] Andrew S. Tanenbaum,et al. A Virtual Machine Based Information Flow Control System for Policy Enforcement , 2008, Electron. Notes Theor. Comput. Sci..
[9] Qing Zhang,et al. Neon: system support for derived data management , 2010, VEE '10.
[10] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[11] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[12] Christoforos E. Kozyrakis,et al. Tainting is not pointless , 2010, OPSR.
[13] Xi Wang,et al. Improving application security with data flow assertions , 2009, SOSP '09.
[14] Eddie Kohler,et al. Making information flow explicit in HiStar , 2006, OSDI '06.
[15] Herbert Bos,et al. Pointless tainting?: evaluating the practicality of pointer tainting , 2009, EuroSys '09.
[16] Andrew C. Myers,et al. A decentralized model for information flow control , 1997, SOSP.
[17] Christoforos E. Kozyrakis,et al. Hardware Enforcement of Application Security Policies Using Tagged Memory , 2008, OSDI.
[18] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .