메뉴 건너뛰기




Volumn , Issue , 2008, Pages 401-412

From speculation to security: Practical and efficient information flow tracking using speculative hardware

Author keywords

[No Author keywords available]

Indexed keywords

ARCHITECTURAL IMPROVEMENTS; ARCHITECTURAL SUPPORT; DECOUPLING MECHANISMS; DYNAMIC INFORMATION FLOW TRACKING; FALSE POSITIVES; HARDWARE SUPPORTS; INFORMATION FLOWS; INTERNATIONAL SYMPOSIUM; ITANIUM PROCESSOR; MEMORY CORRUPTION; PERFORMANCE MEASUREMENTS; SECURITY ASSESSMENT; SECURITY ATTACKS; SECURITY POLICIES; SERVER APPLICATIONS; SOFTWARE-BASED; SPECULATIVE EXECUTION;

EID: 52649112833     PISSN: 10636897     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISCA.2008.18     Document Type: Conference Paper
Times cited : (40)

References (27)
  • 1
    • 52649110353 scopus 로고    scopus 로고
    • Cybersecurity: A crisis of prioritization. Technical report, Presidents Information Technology Advisory Committee (PITAC), Feb. 2005.
    • Cybersecurity: A crisis of prioritization. Technical report, Presidents Information Technology Advisory Committee (PITAC), Feb. 2005.
  • 3
    • 34547335786 scopus 로고    scopus 로고
    • TaintTrace: Efficient Flow Tracing with Dynamic Binary Rewriting
    • W. Cheng, Q. Zhao, B. Yu, and S. Hiroshige. TaintTrace: Efficient Flow Tracing with Dynamic Binary Rewriting. In Proc. ISCC, 2006.
    • (2006) Proc. ISCC
    • Cheng, W.1    Zhao, Q.2    Yu, B.3    Hiroshige, S.4
  • 5
    • 34548212308 scopus 로고    scopus 로고
    • Dytan: A generic dynamic taint analysis framework
    • J. Clause, W. Li, and A. Orso. Dytan: a generic dynamic taint analysis framework. In Proc. ISSTA, pages 196-206, 2007.
    • (2007) Proc. ISSTA , pp. 196-206
    • Clause, J.1    Li, W.2    Orso, A.3
  • 6
    • 33845391802 scopus 로고    scopus 로고
    • M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: end-to-end containment of internet worms. In. Proc. SOSP, pages 133-147, 2005.
    • M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: end-to-end containment of internet worms. In. Proc. SOSP, pages 133-147, 2005.
  • 7
    • 21644482450 scopus 로고    scopus 로고
    • Minos: Control Data Attack Prevention Orthogonal to Memory Model
    • J. Crandall and F. Chong. Minos: Control Data Attack Prevention Orthogonal to Memory Model. Proc. Micro, pages 221-232, 2004.
    • (2004) Proc. Micro , pp. 221-232
    • Crandall, J.1    Chong, F.2
  • 8
    • 35348907867 scopus 로고    scopus 로고
    • Raksha: A flexible information flow architecture for software security
    • M. Dalton, H. Kannan, and C. Kozyrakis. Raksha: a flexible information flow architecture for software security. In Proc. ISCA, pages 482-493, 2007.
    • (2007) Proc. ISCA , pp. 482-493
    • Dalton, M.1    Kannan, H.2    Kozyrakis, C.3
  • 9
    • 0032123777 scopus 로고    scopus 로고
    • The IA-64 architecture at work
    • C. Dulong. The IA-64 architecture at work. Computer, 31(7):24-32, 1998.
    • (1998) Computer , vol.31 , Issue.7 , pp. 24-32
    • Dulong, C.1
  • 11
    • 52649177512 scopus 로고    scopus 로고
    • Method, and system for deferring exceptions generated during speculative execution,
    • Nov. 25, US Patent 5,692, 169
    • V. Kathail, R. Gupta, B. Rau, M. Schlansker, W. Worley Jr, and F. Amerson. Method, and system for deferring exceptions generated during speculative execution, Nov. 25 1997. US Patent 5,692, 169.
    • (1997)
    • Kathail, V.1    Gupta, R.2    Rau, B.3    Schlansker, M.4    Worley Jr, W.5    Amerson, F.6
  • 12
    • 39049160206 scopus 로고    scopus 로고
    • A general dynamic information flow tracking framework for security applications
    • L. C. Lam and T. cker Chiueh. A general dynamic information flow tracking framework for security applications. In Proc. ACSAC, 2006.
    • (2006) Proc. ACSAC
    • Lam, L.C.1    cker Chiueh, T.2
  • 13
    • 52649153312 scopus 로고    scopus 로고
    • Coverage Maximization Using Dynamic Taint Tracing
    • Technical Report 112, MIT Lincoln Laboratory
    • T. Leek, G. Baker, R. Brown, M. Zhivich, and R. Lippmann. Coverage Maximization Using Dynamic Taint Tracing. Technical Report 112, MIT Lincoln Laboratory, 2007.
    • (2007)
    • Leek, T.1    Baker, G.2    Brown, R.3    Zhivich, M.4    Lippmann, R.5
  • 14
    • 0038039851 scopus 로고    scopus 로고
    • A compiler framework for speculative analysis and optimizations
    • J. Lin, T. Chen, W. Hsu, P. Yew, R. Ju, T. Ngai, and S. Chan. A compiler framework for speculative analysis and optimizations. In Proc. PLDI, pages 289-299, 2003.
    • (2003) Proc. PLDI , pp. 289-299
    • Lin, J.1    Chen, T.2    Hsu, W.3    Yew, P.4    Ju, R.5    Ngai, T.6    Chan, S.7
  • 16
    • 0027695220 scopus 로고
    • Sentinel scheduling: A model for compiler-controlled speculative execution
    • S. Mahlke, W. Chen, R. Bringmann, R. Hank, W. Hwu, B. Rau, and M. Schlansker. Sentinel scheduling: a model for compiler-controlled speculative execution. TOCS, 11(4):376-408, 1993.
    • (1993) TOCS , vol.11 , Issue.4 , pp. 376-408
    • Mahlke, S.1    Chen, W.2    Bringmann, R.3    Hank, R.4    Hwu, W.5    Rau, B.6    Schlansker, M.7
  • 17
    • 16244362392 scopus 로고    scopus 로고
    • Detecting and Debugging Insecure Information. Flows
    • W. Masri, A. Podgurski, and D. Leon. Detecting and Debugging Insecure Information. Flows. In Proc. ISSRE, pages 198-209, 2004.
    • (2004) Proc. ISSRE , pp. 198-209
    • Masri, W.1    Podgurski, A.2    Leon, D.3
  • 18
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proc. NDSS, 2005.
    • (2005) Proc. NDSS
    • Newsome, J.1    Song, D.2
  • 20
    • 77957797161 scopus 로고    scopus 로고
    • Parallelizing security checks on commodity hardware
    • E. B. Nightingale, D. Peek, P. M. Chen, and J. Flinn. Parallelizing security checks on commodity hardware. In Proc. ASPLOS, pages 308-318, 2008.
    • (2008) Proc. ASPLOS , pp. 308-318
    • Nightingale, E.B.1    Peek, D.2    Chen, P.M.3    Flinn, J.4
  • 21
    • 33745213901 scopus 로고    scopus 로고
    • Defending against injection attacks through context-sensitive string evaluation
    • T. Pietraszek and C. V. Berghe. Defending against injection attacks through context-sensitive string evaluation. In Proc. RAID, 2005.
    • (2005) Proc. RAID
    • Pietraszek, T.1    Berghe, C.V.2
  • 22
    • 40349087553 scopus 로고    scopus 로고
    • F. Qin, C. Wang, Z. Li, H. Kim, Y. Zhou, and Y. Wu. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks. In Proc. Micro, pages US-MS, 2006.
    • F. Qin, C. Wang, Z. Li, H. Kim, Y. Zhou, and Y. Wu. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks. In Proc. Micro, pages US-MS, 2006.
  • 23
    • 38849110791 scopus 로고    scopus 로고
    • The essence of command injection attacks in web applications
    • Z. Su and G. Wassermann. The essence of command injection attacks in web applications. In Proc. POPL, 2006.
    • (2006) Proc. POPL
    • Su, Z.1    Wassermann, G.2
  • 24
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • G. Suh, J. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In Proc. ASPLOS, pages 85-96, 2004.
    • (2004) Proc. ASPLOS , pp. 85-96
    • Suh, G.1    Lee, J.2    Zhang, D.3    Devadas, S.4
  • 26
    • 52649133112 scopus 로고    scopus 로고
    • FlexiTaint: Programmable Architectural Support for Efficient Dynamic Taint Propagation
    • G. Venkataramani, I. Doudalis, Y. Solihin, and M. Prvulovic. FlexiTaint: Programmable Architectural Support for Efficient Dynamic Taint Propagation. In Proc. HPCA, 2008.
    • (2008) Proc. HPCA
    • Venkataramani, G.1    Doudalis, I.2    Solihin, Y.3    Prvulovic, M.4
  • 27
    • 85038810709 scopus 로고    scopus 로고
    • Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks
    • W. Xu, S. Bhatkar, and R. Sekar. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks. In Proc. Usenix Security, 2006.
    • (2006) Proc. Usenix Security
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.