libdft: practical dynamic data flow tracking for commodity systems
暂无分享,去创建一个
Angelos D. Keromytis | Georgios Portokalidis | Kangkook Jee | Vasileios P. Kemerlis | A. Keromytis | G. Portokalidis | V. P. Kemerlis | Kangkook Jee
[1] Alessandro Orso,et al. Dytan: a generic dynamic taint analysis framework , 2007, ISSTA '07.
[2] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[3] Scott Shenker,et al. Towards Practical Taint Tracking , 2010 .
[4] Andrew Warfield,et al. Practical taint-based protection using demand emulation , 2006, EuroSys.
[5] Jason Flinn,et al. Parallelizing security checks on commodity hardware , 2008, ASPLOS.
[6] Hovav Shacham,et al. Return-oriented programming without returns , 2010, CCS '10.
[7] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[8] Guru Venkataramani,et al. FlexiTaint: A programmable accelerator for dynamic taint propagation , 2008, 2008 IEEE 14th International Symposium on High Performance Computer Architecture.
[9] Cheng Wang,et al. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).
[10] Guilherme Ottoni,et al. RIFLE: An Architectural Framework for User-Centric Information-Flow Security , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[11] Dawn Xiaodong Song,et al. TaintEraser: protecting sensitive data leaks using application-level taint tracking , 2011, OPSR.
[12] Herbert Bos,et al. Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation , 2006, EuroSys.
[13] Herbert Bos,et al. Minemu: The World's Fastest Taint Tracker , 2011, RAID.
[14] Herbert Bos,et al. Eudaemon: involuntary and on-demand emulation against zero-day exploits , 2008, Eurosys '08.
[15] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[16] Eddie Kohler,et al. Making information flow explicit in HiStar , 2006, OSDI '06.
[17] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[18] Christoforos E. Kozyrakis,et al. Real-World Buffer Overflow Protection for Userspace and Kernelspace , 2008, USENIX Security Symposium.
[19] Herbert Bos,et al. Pointless tainting?: evaluating the practicality of pointer tainting , 2009, EuroSys '09.
[20] Angelos D. Keromytis,et al. A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware , 2012, NDSS.
[21] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[22] Angelos D. Keromytis,et al. Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking , 2011, IWSEC.
[23] Tal Garfinkel,et al. VMwareDecoupling Dynamic Program Analysis from Execution in Virtual Environments , 2008, USENIX Annual Technical Conference.
[24] Wei Xu,et al. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks , 2006, USENIX Security Symposium.
[25] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[26] Guofei Gu,et al. TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[27] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[28] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[29] Bryan Ford,et al. Vx32: Lightweight User-level Sandboxing on the x86 , 2008, USENIX Annual Technical Conference.
[30] Stephen McCamant,et al. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation , 2011, NDSS.
[31] Mona Attariyan,et al. Automating Configuration Troubleshooting with Dynamic Information Flow Analysis , 2010, OSDI.