메뉴 건너뛰기




Volumn , Issue , 2009, Pages 61-74

Pointless tainting? Evaluating the practicality of pointer tainting

Author keywords

Dynamic taint analysis; Pointer tainting

Indexed keywords

BUFFER OVERFLOWS; CONTROL DATA; CONTROL FLOWS; DYNAMIC INFORMATION FLOW TRACKING; FALSE POSITIVE; KEYLOGGERS; MALWARES; MEMORY CORRUPTION ATTACKS; OPERATING SYSTEMS; POINTER TAINTING; SYSTEM SECURITY; TROJANS;

EID: 70349160649     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1519065.1519073     Document Type: Conference Paper
Times cited : (96)

References (33)
  • 6
    • 84902507067 scopus 로고    scopus 로고
    • Formal reasoning of various categories of widely exploited security vulnerabilities using pointer taintedness semantics
    • S. Chen, K. Pattabiraman, Z. Kalbarczyk, and R. K. Iyer. Formal reasoning of various categories of widely exploited security vulnerabilities using pointer taintedness semantics. In Proc. of IFIP SEC, 2004.
    • (2004) Proc. of IFIP SEC
    • Chen, S.1    Pattabiraman, K.2    Kalbarczyk, Z.3    Iyer, R.K.4
  • 15
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • D. Denning and P. Denning. Certification of programs for secure information flow. Commnic. ACM, 20(7), 1977.
    • (1977) Commnic. ACM , vol.20 , Issue.7
    • Denning, D.1    Denning, P.2
  • 22
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In 12th Annual Network and Distributed System Security Symposium (NDSS), 2005.
    • (2005) 12th Annual Network and Distributed System Security Symposium (NDSS)
    • Newsome, J.1    Song, D.2
  • 26
    • 84878346861 scopus 로고    scopus 로고
    • Improving host security with system call policies
    • Niels Provos. Improving host security with system call policies. In 12th USENIX Security Symposium, 2003.
    • (2003) 12th USENIX Security Symposium
    • Provos, N.1
  • 27
    • 70349138535 scopus 로고    scopus 로고
    • Sinowal trojan steals data from around 500,000 cards and accounts
    • Oct
    • Dan Raywood. Sinowal trojan steals data from around 500,000 cards and accounts. SC Magazine, Oct 2008.
    • (2008) SC Magazine
    • Raywood, D.1
  • 28
    • 48649093823 scopus 로고    scopus 로고
    • The age of data: Pinpointing guilty bytes in polymorphic buffer overflows on heap or stack
    • A. Slowinska and H. Bos. The age of data: pinpointing guilty bytes in polymorphic buffer overflows on heap or stack. In ACSA'C07, 2007.
    • (2007) ACSA , Issue.C07
    • Slowinska, A.1    Bos, H.2
  • 29
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • E. Suh, J. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. SIGARCH Comput. Archit. News, 32(5):85-96, 2004.
    • (2004) SIGARCH Comput. Archit. News , vol.32 , Issue.5 , pp. 85-96
    • Suh, E.1    Lee, J.2    Zhang, D.3    Devadas, S.4
  • 31
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
    • W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks. In 15th USENIX Security Symposium, 2006.
    • (2006) 15th USENIX Security Symposium
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.