메뉴 건너뛰기




Volumn 51, Issue 2, 2009, Pages 385-404

Algorithms and tool support for dynamic information flow analysis

Author keywords

Direct dynamic control dependence; Dynamic information flow analysis; Dynamic slicing; Forward computation; Insecure flows; Program debugging

Indexed keywords

ALGORITHMS; COMPUTER SOFTWARE; COMPUTER SOFTWARE SELECTION AND EVALUATION; CONCURRENCY CONTROL; DYNAMIC PROGRAMMING; INTRUSION DETECTION; JAVA PROGRAMMING LANGUAGE; PROGRAM DEBUGGING; PULSATILE FLOW; SOFTWARE TESTING; TELECOMMUNICATION NETWORKS;

EID: 56349150784     PISSN: 09505849     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.infsof.2008.05.008     Document Type: Article
Times cited : (32)

References (64)
  • 1
    • 34250656241 scopus 로고    scopus 로고
    • C. Hammer, M. Grimme, J. Krinke, Dynamic path conditions in dependence graphs, in: Proceedings of the 2006 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation (Charleston, South Carolina, January 09-10, 2006). PEPM'06, ACM Press, New York, NY, 2006, pp. 58-67.
    • C. Hammer, M. Grimme, J. Krinke, Dynamic path conditions in dependence graphs, in: Proceedings of the 2006 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation (Charleston, South Carolina, January 09-10, 2006). PEPM'06, ACM Press, New York, NY, 2006, pp. 58-67.
  • 2
    • 0025448361 scopus 로고
    • Dynamic program slicing
    • Agrawal H., and Horgan J. Dynamic program slicing. SIGPLAN Notices 25 6 (1990) 246-256
    • (1990) SIGPLAN Notices , vol.25 , Issue.6 , pp. 246-256
    • Agrawal, H.1    Horgan, J.2
  • 3
    • 0027884535 scopus 로고    scopus 로고
    • H. Agrawal, J. Horgan, E. Krauser, S. London, Incremental regression testing, in: Proceedings of the IEEE Conference on Software Maintenance, Montreal, Canada, 1993.
    • H. Agrawal, J. Horgan, E. Krauser, S. London, Incremental regression testing, in: Proceedings of the IEEE Conference on Software Maintenance, Montreal, Canada, 1993.
  • 4
    • 0035784225 scopus 로고    scopus 로고
    • A. Beszedes, T. Gergely, Z.M. Szabó, J. Csirik, T. Gyimothy, Dynamic slicing method for maintenance of large C programs, in: 5th European Conference on Software Maintenance and Re-engineering, Lisbon, Portugal, March 2001.
    • A. Beszedes, T. Gergely, Z.M. Szabó, J. Csirik, T. Gyimothy, Dynamic slicing method for maintenance of large C programs, in: 5th European Conference on Software Maintenance and Re-engineering, Lisbon, Portugal, March 2001.
  • 6
    • 34548212308 scopus 로고    scopus 로고
    • J. Clause, W., Li, A. Orso, Dytan: a generic dynamic taint analysis framework, in: International Symposium on Software Testing and Analysis 2007 (ISSTA 2007).
    • J. Clause, W., Li, A. Orso, Dytan: a generic dynamic taint analysis framework, in: International Symposium on Software Testing and Analysis 2007 (ISSTA 2007).
  • 7
    • 85129474555 scopus 로고    scopus 로고
    • W. Cheng, Q. Zhao, B. Yu, S. Hiroshige, TaintTrace: efficient flow tracing with dynamic binary rewriting, in: Proceedings of the 11th IEEE Symposium on Computers and Communications, 2006.
    • W. Cheng, Q. Zhao, B. Yu, S. Hiroshige, TaintTrace: efficient flow tracing with dynamic binary rewriting, in: Proceedings of the 11th IEEE Symposium on Computers and Communications, 2006.
  • 8
    • 21644482450 scopus 로고    scopus 로고
    • J.R. Crandall, F.T. Chong, Minos: control data attack prevention orthogonal to memory model, in: MICRO-37, 2004.
    • J.R. Crandall, F.T. Chong, Minos: control data attack prevention orthogonal to memory model, in: MICRO-37, 2004.
  • 10
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Denning D.E. A lattice model of secure information flow. Communication of the ACM 19 5 (1976) 236-242
    • (1976) Communication of the ACM , vol.19 , Issue.5 , pp. 236-242
    • Denning, D.E.1
  • 11
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Denning D.E., and Denning P.J. Certification of programs for secure information flow. Communication of the ACM 20 7 (1977) 504-513
    • (1977) Communication of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 12
    • 56349130397 scopus 로고    scopus 로고
    • D.E. Denning, Secure information flow in computer systems. Ph.D. Thesis, Computer Science Department, Purdue U., W. Lafayette, Ind., May 1975.
    • D.E. Denning, Secure information flow in computer systems. Ph.D. Thesis, Computer Science Department, Purdue U., W. Lafayette, Ind., May 1975.
  • 13
    • 0036459423 scopus 로고    scopus 로고
    • Handling pointers and unstructured statements in the forward computed dynamic slice algorithm
    • Faragó C., and Gergely T. Handling pointers and unstructured statements in the forward computed dynamic slice algorithm. Acta Cybernetica 15 (2002) 489-508
    • (2002) Acta Cybernetica , vol.15 , pp. 489-508
    • Faragó, C.1    Gergely, T.2
  • 14
    • 0016382977 scopus 로고
    • Memoryless subsystems
    • Fenton J.S. Memoryless subsystems. The Computer Journal 17 2 (1974) 143-147
    • (1974) The Computer Journal , vol.17 , Issue.2 , pp. 143-147
    • Fenton, J.S.1
  • 16
    • 84887476214 scopus 로고    scopus 로고
    • T. Gyimothy, A. Beszedes, C. Farago, An efficient relevant slicing method for debugging, in: Proceedings of the 7th European Software Engineering Coinference, Toulouse, France, September 1999, pp. 303-321.
    • T. Gyimothy, A. Beszedes, C. Farago, An efficient relevant slicing method for debugging, in: Proceedings of the 7th European Software Engineering Coinference, Toulouse, France, September 1999, pp. 303-321.
  • 17
    • 34250656241 scopus 로고    scopus 로고
    • C. Hammer, M. Grimme, J. Krinke, Dynamic path conditions in dependence graphs, in: Proceedings of the 2006 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-based Program Manipulation, Charleston, South Carolina, January 09-10, 2006, PEPM'06, ACM Press, New York, NY, 2006, pp. 58-67.
    • C. Hammer, M. Grimme, J. Krinke, Dynamic path conditions in dependence graphs, in: Proceedings of the 2006 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-based Program Manipulation, Charleston, South Carolina, January 09-10, 2006, PEPM'06, ACM Press, New York, NY, 2006, pp. 58-67.
  • 18
    • 56349100869 scopus 로고    scopus 로고
    • D. Jackson, E. Rolling, A new model of program dependences for reverse engineering, in: Symposium on Foundations of Software Engineering, New Orleans, Louisiana, 1994.
    • D. Jackson, E. Rolling, A new model of program dependences for reverse engineering, in: Symposium on Foundations of Software Engineering, New Orleans, Louisiana, 1994.
  • 19
    • 56349135645 scopus 로고    scopus 로고
    • V. Haldar, d. Chandra, M. Franz, Practical Dynamic Information-flow for Virtual Machines, Technical Report No. 05-02, Department of Information and Computer Science, University of California, Irvine, February 2005.
    • V. Haldar, d. Chandra, M. Franz, Practical Dynamic Information-flow for Virtual Machines, Technical Report No. 05-02, Department of Information and Computer Science, University of California, Irvine, February 2005.
  • 20
    • 0034592895 scopus 로고    scopus 로고
    • M. Hind, A. Pioli, Which pointer analysis should I use?, International Symposium on Software Testing and Analysis, 2000.
    • M. Hind, A. Pioli, Which pointer analysis should I use?, International Symposium on Software Testing and Analysis, 2000.
  • 22
    • 0032181540 scopus 로고    scopus 로고
    • The feature and service interaction problem in telecommunications systems: a survey
    • Keck D.O., and Kuehn P.J. The feature and service interaction problem in telecommunications systems: a survey. IEEE Transactions on Software Engineering 24 10 (1998) 779-796
    • (1998) IEEE Transactions on Software Engineering , vol.24 , Issue.10 , pp. 779-796
    • Keck, D.O.1    Kuehn, P.J.2
  • 23
    • 0002904482 scopus 로고    scopus 로고
    • Computation of dynamic program slices for unstructured programs
    • Korel B. Computation of dynamic program slices for unstructured programs. IEEE TSE 23 1 (1997) 17-34
    • (1997) IEEE TSE , vol.23 , Issue.1 , pp. 17-34
    • Korel, B.1
  • 24
    • 84885648508 scopus 로고    scopus 로고
    • B. Korel, J. Laski, Algorithmic software fault localization, in: Proceedings of the 24th Annual Hawaii International Conference on System Sciences, vol. II, 1991, pp. 246-251.
    • B. Korel, J. Laski, Algorithmic software fault localization, in: Proceedings of the 24th Annual Hawaii International Conference on System Sciences, vol. II, 1991, pp. 246-251.
  • 26
    • 84980046752 scopus 로고
    • Forward computation of dynamic program slices
    • Korel B., and Yalamanchili S. Forward computation of dynamic program slices. ISSTA (1994) 66-79
    • (1994) ISSTA , pp. 66-79
    • Korel, B.1    Yalamanchili, S.2
  • 27
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Lampson B.W. A note on the confinement problem. Communication of the ACM 16 10 (1973) 613-615
    • (1973) Communication of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 28
    • 33244494413 scopus 로고    scopus 로고
    • D. Leon, W. Masri, A. Podgurski, An empirical evaluation of test case filtering techniques based on exercising complex information flows, in: International Conference on Software Engineering, St. Louis, MO, May 2005.
    • D. Leon, W. Masri, A. Podgurski, An empirical evaluation of test case filtering techniques based on exercising complex information flows, in: International Conference on Software Engineering, St. Louis, MO, May 2005.
  • 29
    • 16244362392 scopus 로고    scopus 로고
    • W. Masri, A. Podgurski, D. Leon, Detecting and debugging insecure information flows 15th, in: IEEE International Symposium on Software Reliability Engineering, ISSRE 2004, St. Malo, France, November 2-5, 2004.
    • W. Masri, A. Podgurski, D. Leon, Detecting and debugging insecure information flows 15th, in: IEEE International Symposium on Software Reliability Engineering, ISSRE 2004, St. Malo, France, November 2-5, 2004.
  • 30
    • 34547691021 scopus 로고    scopus 로고
    • W. Masri, N. Nahas, A. Podgurski, Memorized forward computation of program slices, in: 17th IEEE International Symposium on Software Reliability Engineering, ISSRE 2006. Raleigh, NC, USA, November, 2006.
    • W. Masri, N. Nahas, A. Podgurski, Memorized forward computation of program slices, in: 17th IEEE International Symposium on Software Reliability Engineering, ISSRE 2006. Raleigh, NC, USA, November, 2006.
  • 31
    • 85085405276 scopus 로고    scopus 로고
    • W. Masri, A. Podgurski, Using dynamic information flow analysis to detect attacks against applications, in: 2005 Workshop on Software Engineering for Security Systems, St. Louis, MI, May 2005.
    • W. Masri, A. Podgurski, Using dynamic information flow analysis to detect attacks against applications, in: 2005 Workshop on Software Engineering for Security Systems, St. Louis, MI, May 2005.
  • 32
    • 56349124452 scopus 로고    scopus 로고
    • W. Masri, A. Podgurski, An empirical study of the relationship between information flow and program dependence, in: Fourth International Workshop on Dynamic Analysis (WODA 2006), Shanghai, China, May 2006.
    • W. Masri, A. Podgurski, An empirical study of the relationship between information flow and program dependence, in: Fourth International Workshop on Dynamic Analysis (WODA 2006), Shanghai, China, May 2006.
  • 33
    • 56349128959 scopus 로고    scopus 로고
    • W. Masri, Dynamic information flow analysis, slicing, and profiling, Ph.D. dissertation, 2005, Case Western Reserve University, Cleveland, OH.
    • W. Masri, Dynamic information flow analysis, slicing, and profiling, Ph.D. dissertation, 2005, Case Western Reserve University, Cleveland, OH.
  • 34
    • 34250772325 scopus 로고    scopus 로고
    • W. Masri, A. Podgurski, An empirical study of test case filtering techniques based on exercising information flows, in: TSE 2007.
    • W. Masri, A. Podgurski, An empirical study of test case filtering techniques based on exercising information flows, in: TSE 2007.
  • 36
    • 56349168223 scopus 로고    scopus 로고
    • S. Mccamant, M. Ernst, Quantitative Information-Flow Tracking for C and Related Languages. MIT Computer Science and Artificial Intelligence Laboratory technical report MIT-CSAIL-TR-2006-076, Cambridge, MA, November 2006.
    • S. Mccamant, M. Ernst, Quantitative Information-Flow Tracking for C and Related Languages. MIT Computer Science and Artificial Intelligence Laboratory technical report MIT-CSAIL-TR-2006-076, Cambridge, MA, November 2006.
  • 37
    • 36448929074 scopus 로고    scopus 로고
    • S. Mccamant, M. Ernst, A simulation-based proof technique for dynamic information flow, in: ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, San Diego, CA, USA, June 2007.
    • S. Mccamant, M. Ernst, A simulation-based proof technique for dynamic information flow, in: ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, San Diego, CA, USA, June 2007.
  • 38
    • 56349097032 scopus 로고    scopus 로고
    • S. Nair, P. Simpson, B. Crispo, A. Tanenbaum, Design and implementation of a virtual machine based information flow control system, Vrije Universiteit technical report IR-CS-024, May 2007.
    • S. Nair, P. Simpson, B. Crispo, A. Tanenbaum, Design and implementation of a virtual machine based information flow control system, Vrije Universiteit technical report IR-CS-024, May 2007.
  • 39
    • 56349094955 scopus 로고    scopus 로고
    • J. Newsome, D. Song, Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software, in: Proceedings of the Network and Distributed System Security Symposium (NDSS 2005), 2005.
    • J. Newsome, D. Song, Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software, in: Proceedings of the Network and Distributed System Security Symposium (NDSS 2005), 2005.
  • 40
    • 0025491545 scopus 로고
    • A formal model of program dependencies and its implications for software testing debugging and maintenance
    • Podgurski A., and Clarke L. A formal model of program dependencies and its implications for software testing debugging and maintenance. IEEE TSE 16 9 (1990) 965-979
    • (1990) IEEE TSE , vol.16 , Issue.9 , pp. 965-979
    • Podgurski, A.1    Clarke, L.2
  • 41
    • 56349142265 scopus 로고    scopus 로고
    • A. Podgurski, Significance of program dependences for software testing, debugging and maintenance. Ph.D. Thesis. Computer Sc. Dept., U. of Mass., (September 1989).
    • A. Podgurski, Significance of program dependences for software testing, debugging and maintenance. Ph.D. Thesis. Computer Sc. Dept., U. of Mass., (September 1989).
  • 42
    • 42449096142 scopus 로고    scopus 로고
    • Reachability analysis of feature interactions: a progress report
    • Pomakis K.P., and Atlee J.M. Reachability analysis of feature interactions: a progress report. ISSTA (1996) 216-223
    • (1996) ISSTA , pp. 216-223
    • Pomakis, K.P.1    Atlee, J.M.2
  • 43
    • 40349087553 scopus 로고    scopus 로고
    • Q. Feng, W. Cheng, L. Zhenmin, K. Ho-seop, Z. Yuanyuan, Wu Youfeng, LIFT: a low-overhead practical information flow tracking system for detecting security attacks, in: MICRO-39, 2006.
    • Q. Feng, W. Cheng, L. Zhenmin, K. Ho-seop, Z. Yuanyuan, Wu Youfeng, LIFT: a low-overhead practical information flow tracking system for detecting security attacks, in: MICRO-39, 2006.
  • 46
    • 56349116966 scopus 로고    scopus 로고
    • Soot: a Java Optimization Framework. Available from: .
    • Soot: a Java Optimization Framework. Available from: .
  • 47
    • 0034593043 scopus 로고    scopus 로고
    • S. Steven, P. Chandra, B. Fleck, A. Podgurski, jRapture: a capture/replay tool for observation-based testing, in: 2000 International Symposium on Software Testing and Analysis, Portland, Oregon, August 2000, pp. 158-167.
    • S. Steven, P. Chandra, B. Fleck, A. Podgurski, jRapture: a capture/replay tool for observation-based testing, in: 2000 International Symposium on Software Testing and Analysis, Portland, Oregon, August 2000, pp. 158-167.
  • 48
    • 12844267418 scopus 로고    scopus 로고
    • G.E. Suh, J. Lee, S. Devadas, Secure program execution via dynamic information flow tracking, in: 11th International Conference on Architectural Support for Programming Languages and Operating Systems, Boston, MA, 2004.
    • G.E. Suh, J. Lee, S. Devadas, Secure program execution via dynamic information flow tracking, in: 11th International Conference on Architectural Support for Programming Languages and Operating Systems, Boston, MA, 2004.
  • 49
    • 56349118232 scopus 로고    scopus 로고
    • The Byte Code Engineering Library (BCEL), The Apache Jakarta Project, http://jakarta.apache.org/bcel. Apache Software Foundation 2003.
    • The Byte Code Engineering Library (BCEL), The Apache Jakarta Project, http://jakarta.apache.org/bcel. Apache Software Foundation 2003.
  • 50
    • 56349111232 scopus 로고    scopus 로고
    • T. Lindholm, F. Yellin, The Java Virtual Machine Specification, second ed.
    • T. Lindholm, F. Yellin, The Java Virtual Machine Specification, second ed.
  • 51
    • 0000990322 scopus 로고
    • A survey of program slicing techniques
    • Tip F. A survey of program slicing techniques. Journal of Programming Languages 3 3 (1995) 121-189
    • (1995) Journal of Programming Languages , vol.3 , Issue.3 , pp. 121-189
    • Tip, F.1
  • 52
    • 21644475650 scopus 로고    scopus 로고
    • N. Vachharajani, M. Bridges, J. Chang, R. Rangan, G. Ottoni, J. Blome, G. Reis, M. Vachharajani, D. August, RIFLE: an architectural framework for user-centric information-flow security, in: Proceedings of the 37th International Symposium on Microarchitecture (MICRO), December 2004.
    • N. Vachharajani, M. Bridges, J. Chang, R. Rangan, G. Ottoni, J. Blome, G. Reis, M. Vachharajani, D. August, RIFLE: an architectural framework for user-centric information-flow security, in: Proceedings of the 37th International Symposium on Microarchitecture (MICRO), December 2004.
  • 53
    • 4544284860 scopus 로고    scopus 로고
    • T. Wang, A. Roychoudhury, Using compressed bytecode traces for slicing Java programs, in: Internatonal Conference on Software Engineering, Edinburgh, UK, May 2004.
    • T. Wang, A. Roychoudhury, Using compressed bytecode traces for slicing Java programs, in: Internatonal Conference on Software Engineering, Edinburgh, UK, May 2004.
  • 56
    • 34548246449 scopus 로고    scopus 로고
    • B. Xin, X. Zhang, Efficient online detection of dynamic control dependence, in: International Symposium on Software Testing and Analysis, ISSTA 2007.
    • B. Xin, X. Zhang, Efficient online detection of dynamic control dependence, in: International Symposium on Software Testing and Analysis, ISSTA 2007.
  • 57
    • 56349120892 scopus 로고    scopus 로고
    • W. Xu, S. Bakhtar, R.A Sekar, Unified Approach to Preventing Attacks Exploiting a Range of Software Vulnerabilities, Technical Report SECLAB-05-05, Department of Computer Science, Stony Brook University, August 2005.
    • W. Xu, S. Bakhtar, R.A Sekar, Unified Approach to Preventing Attacks Exploiting a Range of Software Vulnerabilities, Technical Report SECLAB-05-05, Department of Computer Science, Stony Brook University, August 2005.
  • 58
    • 4544331311 scopus 로고    scopus 로고
    • X. Zhang, R. Gupta, Y. Zhang, Efficient Forward Computation of Dynamic Slices Using Reduced Ordered Binary Decision Diagrams, in: International Conference on Software Engineering, Edinburgh, UK, May 2004.
    • X. Zhang, R. Gupta, Y. Zhang, Efficient Forward Computation of Dynamic Slices Using Reduced Ordered Binary Decision Diagrams, in: International Conference on Software Engineering, Edinburgh, UK, May 2004.
  • 59
    • 0038262825 scopus 로고    scopus 로고
    • X. Zhang, R. Gupta, Y. Zhang, Precise Dynamic Slicing Algorithms, in: IEEE/ACM International Conference on Software Engineering, Portland, Oregon, May 2003, pp. 319-329.
    • X. Zhang, R. Gupta, Y. Zhang, Precise Dynamic Slicing Algorithms, in: IEEE/ACM International Conference on Software Engineering, Portland, Oregon, May 2003, pp. 319-329.
  • 60
    • 33746089176 scopus 로고    scopus 로고
    • X. Zhang, N. Gupta, R. Gupta, Pruning dynamic slices with confidence, in: PLDI 2006.
    • X. Zhang, N. Gupta, R. Gupta, Pruning dynamic slices with confidence, in: PLDI 2006.
  • 61
    • 29844458023 scopus 로고    scopus 로고
    • X. Zhang, H. He, N. Gupta, R. Gupta, Experimental evaluation of using dynamic slices for fault location, in: AADEBUG, 2005.
    • X. Zhang, H. He, N. Gupta, R. Gupta, Experimental evaluation of using dynamic slices for fault location, in: AADEBUG, 2005.
  • 62
    • 34247096141 scopus 로고    scopus 로고
    • X. Zhang, N. Gupta, R. Gupta, Locating Faults through automated predicate switching, in: International Conference on Software Engineering, 2006.
    • X. Zhang, N. Gupta, R. Gupta, Locating Faults through automated predicate switching, in: International Conference on Software Engineering, 2006.
  • 63
    • 0142219252 scopus 로고    scopus 로고
    • J. Zimmermann, L. Mé, C. Bidan, An improved reference flow control model for policy-based intrusion detection, in: 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 2003, Lecture Notes in Computer Science 2808, Springer-Verlag.
    • J. Zimmermann, L. Mé, C. Bidan, An improved reference flow control model for policy-based intrusion detection, in: 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 2003, Lecture Notes in Computer Science 2808, Springer-Verlag.
  • 64
    • 21644442136 scopus 로고    scopus 로고
    • J. Zimmermann, L. Mé, C. Bidan, Experimenting with a policy-based HIDS based on and information flow control model, in: 19th Computer Security Applications Conference, Las Vegas, November 2003.
    • J. Zimmermann, L. Mé, C. Bidan, Experimenting with a policy-based HIDS based on and information flow control model, in: 19th Computer Security Applications Conference, Las Vegas, November 2003.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.