메뉴 건너뛰기




Volumn , Issue , 2009, Pages 105-114

Decoupling dynamic information flow tracking with a dedicated coprocessor

Author keywords

Coprocessors; Dynamic information flow tracking; Processor architecture; Semantic vulnerabilities; Software security

Indexed keywords

CO-PROCESSORS; DYNAMIC INFORMATION FLOW TRACKING; PROCESSOR ARCHITECTURE; PROCESSOR ARCHITECTURES; SOFTWARE SECURITY;

EID: 70449976325     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN.2009.5270347     Document Type: Conference Paper
Times cited : (66)

References (27)
  • 2
    • 0033321638 scopus 로고    scopus 로고
    • DIVA: A Reliable Substrate for Deep Submicron Microarchitecture Design
    • Haifa, Israel, Nov
    • T. Austin. DIVA: A Reliable Substrate for Deep Submicron Microarchitecture Design. In the Proc. of the 32nd MICRO, Haifa, Israel, Nov. 1999.
    • (1999) the Proc. of the 32nd MICRO
    • Austin, T.1
  • 3
    • 34547185267 scopus 로고    scopus 로고
    • Logs and Lifeguards: Accelerating Dynamic Program Monitoring
    • Technical Report IRP-TR-06-05, Intel Research, Pittsburgh, PA
    • S. Chen, B. Falsafi, et al. Logs and Lifeguards: Accelerating Dynamic Program Monitoring. Technical Report IRP-TR-06-05, Intel Research, Pittsburgh, PA, 2006.
    • (2006)
    • Chen, S.1    Falsafi, B.2
  • 4
    • 52649155221 scopus 로고    scopus 로고
    • Flexible Hardware Acceleration for Instruction-Grain Program Monitoring
    • Beijing, China, June
    • S. Chen, M. Kozuch, et al. Flexible Hardware Acceleration for Instruction-Grain Program Monitoring. In the Proc. of the 35th ISCA, Beijing, China, June 2008.
    • (2008) the Proc. of the 35th ISCA
    • Chen, S.1    Kozuch, M.2
  • 5
    • 27544498541 scopus 로고    scopus 로고
    • Defeating Memory Corruption Attacks via Pointer Taintedness Detection
    • Yokohama, Japan, June
    • S. Chen, J. Xu, et al. Defeating Memory Corruption Attacks via Pointer Taintedness Detection. In the Proc. of the 35th DSN, Yokohama, Japan, June 2005.
    • (2005) the Proc. of the 35th DSN
    • Chen, S.1    Xu, J.2
  • 6
    • 57749185043 scopus 로고    scopus 로고
    • Thread-Safe Dynamic Binary Translation using Transactional Memory
    • Salt Lake City, UT, Feb
    • J. Chung, M. Dalton, et al. Thread-Safe Dynamic Binary Translation using Transactional Memory. In the Proc. of the 14th HPCA, Salt Lake City, UT, Feb. 2008.
    • (2008) the Proc. of the 14th HPCA
    • Chung, J.1    Dalton, M.2
  • 7
    • 21644482450 scopus 로고    scopus 로고
    • MINOS: Control Data Attack Prevention Orthogonal to Memory Model
    • Portland, OR, Dec
    • J. R. Crandall and F. T. Chong. MINOS: Control Data Attack Prevention Orthogonal to Memory Model. In the Proc. of the 37th MICRO, Portland, OR, Dec. 2004.
    • (2004) the Proc. of the 37th MICRO
    • Crandall, J.R.1    Chong, F.T.2
  • 8
    • 35348907867 scopus 로고    scopus 로고
    • Raksha: A Flexible Information Flow Architecture for Software Security
    • San Diego, CA, June
    • M. Dalton, H. Kannan, and C. Kozyrakis. Raksha: A Flexible Information Flow Architecture for Software Security. In the Proc. of the 34th ISCA, San Diego, CA, June 2007.
    • (2007) the Proc. of the 34th ISCA
    • Dalton, M.1    Kannan, H.2    Kozyrakis, C.3
  • 10
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. ACM Communications, 20(7), 1977.
    • (1977) ACM Communications , vol.20 , Issue.7
    • Denning, D.E.1    Denning, P.J.2
  • 11
    • 85180406262 scopus 로고    scopus 로고
    • Ostia: A Delegating Architecture for Secure System Call Interposition
    • San Diego, CA, Feb
    • T. Garfinkel, B. Pfaff, and M. Rosenblum. Ostia: A Delegating Architecture for Secure System Call Interposition. In the Proc. of the 11th NDSS, San Diego, CA, Feb. 2004.
    • (2004) the Proc. of the 11th NDSS
    • Garfinkel, T.1    Pfaff, B.2    Rosenblum, M.3
  • 12
    • 70449935825 scopus 로고    scopus 로고
    • Intel Virtualization Technology (Intel VTx). http://www.intel.com/ technology/virtualization.
    • Intel Virtualization Technology (Intel VTx). http://www.intel.com/ technology/virtualization.
  • 15
    • 0023961238 scopus 로고
    • Concurrent error detection using watchdog processors - a survey
    • A. Mahmood and E. J. McCluskey. Concurrent error detection using watchdog processors - a survey. IEEE Trans. on Computers, 37(2), 1988.
    • (1988) IEEE Trans. on Computers , vol.37 , Issue.2
    • Mahmood, A.1    McCluskey, E.J.2
  • 16
    • 77949699943 scopus 로고    scopus 로고
    • Dynamic Information Tracking on Multcores
    • Salt Lake City, UT, Feb
    • V. Nagarajan, H.Kim, et al. Dynamic Information Tracking on Multcores. In the Proc. of the 12th INTERACT, Salt Lake City, UT, Feb. 2008.
    • (2008) the Proc. of the 12th INTERACT
    • Nagarajan, V.1    Kim, H.2
  • 17
    • 4544387534 scopus 로고    scopus 로고
    • An Architectural Framework for Providing Reliability and Security Support
    • Florence, Italy
    • N. Nakka, Z. Kalbarczyk, et al. An Architectural Framework for Providing Reliability and Security Support. In the Proc. of the 34th DSN, Florence, Italy, 2004.
    • (2004) the Proc. of the 34th DSN
    • Nakka, N.1    Kalbarczyk, Z.2
  • 18
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
    • San Diego, CA, Feb
    • J. Newsome and D. X. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In the Proc. of the 12th NDSS, San Diego, CA, Feb. 2005.
    • (2005) the Proc. of the 12th NDSS
    • Newsome, J.1    Song, D.X.2
  • 20
    • 40349087553 scopus 로고    scopus 로고
    • LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
    • Orlando, FL, Dec
    • F. Qin, C. Wang, et al. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks. In the Proc. of the 39th MICRO, Orlando, FL, Dec. 2006.
    • (2006) the Proc. of the 39th MICRO
    • Qin, F.1    Wang, C.2
  • 22
    • 33748870010 scopus 로고    scopus 로고
    • InfoShield: A Security Architecture for Protecting Information Usage in Memory
    • Austin, TX
    • W. Shi, J. Fryman, et al. InfoShield: A Security Architecture for Protecting Information Usage in Memory. In the Proc. of the 12th HPCA, Austin, TX, 2006.
    • (2006) the Proc. of the 12th HPCA
    • Shi, W.1    Fryman, J.2
  • 23
    • 70449749398 scopus 로고    scopus 로고
    • Personal communication with Shih-Lien Lu, Senior Prinicipal Researcher, Intel Microprocessor Technology Labs, Hillsboro, OR
    • Personal communication with Shih-Lien Lu, Senior Prinicipal Researcher, Intel Microprocessor Technology Labs, Hillsboro, OR.
  • 24
    • 84944113045 scopus 로고    scopus 로고
    • Secure Program Execution via Dynamic Information Flow Tracking
    • Boston, MA, Oct
    • G. E. Suh, J. W. Lee, et al. Secure Program Execution via Dynamic Information Flow Tracking. In the Proc. of the 11th ASPLOS, Boston, MA, Oct. 2004.
    • (2004) the Proc. of the 11th ASPLOS
    • Suh, G.E.1    Lee, J.W.2
  • 25
    • 21644475650 scopus 로고    scopus 로고
    • RIFLE: An Architectural Framework for User-Centric Information-Flow Security
    • Portland, OR, Dec
    • N. Vachharajani, M. J. Bridges, et al. RIFLE: An Architectural Framework for User-Centric Information-Flow Security. In the Proc. of the 37th MICRO, Portland, OR, Dec. 2004.
    • (2004) the Proc. of the 37th MICRO
    • Vachharajani, N.1    Bridges, M.J.2
  • 26
    • 57749197593 scopus 로고    scopus 로고
    • FlexiTaint: A Programmable Accelerator for Dynamic Taint Propagation
    • Salt Lake City, UT, Feb
    • G. Venkataramani, I. Doudalis, et al. FlexiTaint: A Programmable Accelerator for Dynamic Taint Propagation. In the Proc. of the 14th HPCA, Salt Lake City, UT, Feb. 2008.
    • (2008) the Proc. of the 14th HPCA
    • Venkataramani, G.1    Doudalis, I.2
  • 27
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
    • Vancouver, Canada, Aug
    • W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In the Proc. of the 15th USENIX Security Symp., Vancouver, Canada, Aug. 2006.
    • (2006) the Proc. of the 15th USENIX Security Symp
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.