-
2
-
-
34547335786
-
TaintTrace: Efficient flow tracing with dyanmic binary rewriting
-
(Jun
-
Cheng, W., Zhao, Q., Yu, B., Hiroshige, S. TaintTrace: Efficient flow tracing with dyanmic binary rewriting. In Proceedings of the IEEE Symposium on Computers and Communications (ISCC) (Jun. 2006), 749-754.
-
(2006)
Proceedings of the IEEE Symposium on Computers and Communications (ISCC)
, pp. 749-754
-
-
Cheng, W.1
Zhao, Q.2
Yu, B.3
Hiroshige, S.4
-
3
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
Aug
-
Chow, J., Pfaff, B., Garfinkel, T., Christopher, K., Rosenblum, M. Understanding data lifetime via whole system simulation. In Proceedings of the 13th USENIX Security Symposium (Aug. 2004).
-
(2004)
Proceedings of the 13th USENIX Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
4
-
-
34548212308
-
Dytan: A generic dynamic taint analysis framework
-
Clause, J., Li, W., Orso, A. Dytan: A generic dynamic taint analysis framework. In Proceedings of the 2007 International Symposium on Software Testing and Analysis (2007), 196-206.
-
(2007)
Proceedings of the 2007 International Symposium on Software Testing and Analysis
, pp. 196-206
-
-
Clause, J.1
Li, W.2
Orso, A.3
-
5
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
Oct
-
Costa, M., Crowcroft, J., Castro, M., Rowstron, A., Zhou, L., Zhang, L., Barham, P. Vigilante: End-to-end containment of internet worms. In Proceedings of the ACM Symposium on Operating Systems Principles (Oct. 2005), 133-147.
-
(2005)
Proceedings of the ACM Symposium on Operating Systems Principles
, pp. 133-147
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
7
-
-
0017517624
-
Certification of programs for secure information flow
-
Jul
-
Denning, D.E., Denning, P.J. Certification of Programs for Secure Information Flow. Commun. ACM 20, 7 (Jul. 1977).
-
(1977)
Commun. ACM
, vol.20
, pp. 7
-
-
Denning, D.E.1
Denning, P.J.2
-
8
-
-
84903607772
-
Dyanmic spyware analysis
-
Jun
-
Egele, M., Kruegel, C., Kirda, E., Yin, H., Song, D. Dyanmic spyware analysis. In Proceedings of the USENIX Annual Technical Conference (Jun. 2007), 233-246.
-
(2007)
Proceedings of the USENIX Annual Technical Conference
, pp. 233-246
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Yin, H.4
Song, D.5
-
9
-
-
85076889619
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
(Oct.)
-
E nck, W., Gilbert, P., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI) (Oct. 2010).
-
(2010)
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Enck, W.1
Gilbert, P.2
Chun, B.G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
10
-
-
33846310068
-
Dynamic taint propagation for java
-
Dec
-
Haldar, V., Chandra, D., Franz, M. Dynamic taint propagation for Java. In Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC) (Dec. 2005), 303-311.
-
(2005)
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC)
, pp. 303-311
-
-
Haldar, V.1
Chandra, D.2
Franz, M.3
-
11
-
-
40449091840
-
WAS P: Protecting web applications using positive tainting and syntaxaware evaluation
-
Halfond, W.G., Orso, A., Manolios, P. WAS P: Protecting web applications using positive tainting and syntaxaware evaluation. IEEE Trans. Softw. Eng. 34, 1 (2008), 65-81.
-
(2008)
IEEE Trans. Softw. Eng.
, vol.34
, Issue.1
, pp. 65-81
-
-
Halfond, W.G.1
Orso, A.2
Manolios, P.3
-
12
-
-
34748845128
-
Practical taint-based protection using demand emulation
-
Apr
-
Ho, A., Fetterman, M., Clark, C., Warfield, A., Hand, S. Practical taint-based protection using demand emulation. In Proceedings of the European Conference on Computer Systems (EuroSys) (Apr. 2006), 29-41.
-
(2006)
Proceedings of the European Conference on Computer Systems (EuroSys)
, pp. 29-41
-
-
Ho, A.1
Fetterman, M.2
Clark, C.3
Warfield, A.4
Hand, S.5
-
15
-
-
57349111362
-
A virtual machine based information flow control system for policy enforcement
-
Nair, S.K., Simpson, P.N., Crispo, B., Tanenbaum, A.S. A virtual machine based information flow control system for policy enforcement. In The 1st International Workshop on Run Time Enforcement for Mobile and Distributed Systems (REM) (2007).
-
(2007)
The 1st International Workshop on Run Time Enforcement for Mobile and Distributed Systems (REM)
-
-
Nair, S.K.1
Simpson, P.N.2
Crispo, B.3
Tanenbaum, A.S.4
-
17
-
-
40349087553
-
LIFT: A low-overhead practical information flow tracking system for detecting security attacks
-
Qin, F., Wang, C., Li, Z., seop Kim, H., Zhou, Y., Wu, Y. LIFT: A low-overhead practical information flow tracking system for detecting security attacks. In Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture (2006), 135-148.
-
(2006)
Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture
, pp. 135-148
-
-
Qin, F.1
Wang, C.2
Li, Z.3
Seop Kim, H.4
Zhou, Y.5
Wu, Y.6
-
18
-
-
43449135047
-
Efficient fine-grained binary instrumentation with applications to taint-tracking
-
Apr
-
Saxena, P., Sekar, R., Puranik, V. Efficient fine-grained binary instrumentation with applications to taint-tracking. In Proceedings of the IEEE/ACM symposium on Code Generation and Optimization (CGO) (Apr. 2008), 74-83,.
-
(2008)
Proceedings of the IEEE/ACM symposium on Code Generation and Optimization (CGO)
, pp. 74-83
-
-
Saxena, P.1
Sekar, R.2
Puranik, V.3
-
19
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
Oct
-
Suh, G.E., Lee, J.W., Zhang, D., Devadas, S. Secure program execution via dynamic information flow tracking. In Proceedings of the Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) (Oct. 2004), 85-96.
-
(2004)
Proceedings of the Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
20
-
-
21644475650
-
RIFLE: An architectural framework for user-centric information-flow security
-
Vachharajani, N., Bridges, M.J., Chang, J., Rangan, R., Ottoni, G., Blome, J.A., Reis, G.A., Vachharajani, M., August, D.I. RIFLE: An architectural framework for user-centric information-flow security. In Proceedings of the 37th annual IEEE/ACM International Symposium on Microarchitecture (2004), 243-254.
-
(2004)
Proceedings of the 37th annual IEEE/ACM International Symposium on Microarchitecture
, pp. 243-254
-
-
Vachharajani, N.1
Bridges, M.J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.A.6
Reis, G.A.7
Vachharajani, M.8
August, D.I.9
-
21
-
-
84887309913
-
Crosssite scripting prevention with dynamic data tainting and static analysis
-
Vogt, P., Nentwich, F., Jovanovic, N., Kirda, E., Kruegel, C., Vigna, G. Crosssite scripting prevention with dynamic data tainting and static analysis. In Proceedings of the 14th Network and Distributed System Security Symposium (2007).
-
(2007)
Proceedings of the 14th Network and Distributed System Security Symposium
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Kruegel, C.5
Vigna, G.6
-
22
-
-
85038810709
-
Taintenhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
Aug
-
Xu, W., Bhatkar, S., Sekar, R. Taintenhanced policy enforcement: A practical approach to defeat a wide range of attacks. In Proceedings of the USENIX Security Symposium (Aug. 2006), 121-136.
-
(2006)
Proceedings of the USENIX Security Symposium
, pp. 121-136
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
-
23
-
-
77950788046
-
Panorama: Capturing systemwide information flow for malware detection and analysis
-
Yin, H., Song, D., Egele, M., Kruegel, C., Kirda, E. Panorama: Capturing systemwide information flow for malware detection and analysis. In Proceedings of the 14th ACM Conference on Computer and Communications Security (2007), 116-127.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 116-127
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
-
24
-
-
72249104474
-
Improving application security with data flow assertions
-
Oct
-
Yip, A., Wang, X., Zeldovich, N., Kaashoek, M.F. Improving application security with data flow assertions. In Proceedings of the ACM Symposium on Operating Systems Principles (Oct. 2009).
-
(2009)
Proceedings of the ACM Symposium on Operating Systems Principles
-
-
Yip, A.1
Wang, X.2
Zeldovich, N.3
Kaashoek, M.F.4
-
25
-
-
79959881045
-
Tainteraser: Protecting sensitive data leaks using applicationlevel taint tracking
-
Zhu, D.Y., Jung, J., Song, D., Kohno, T., Wetherall, D. Tainteraser: Protecting sensitive data leaks using applicationlevel taint tracking. Operating Sys. Rev. 45, 1 (2011), 142-154.
-
(2011)
Operating Sys. Rev.
, vol.45
, Issue.1
, pp. 142-154
-
-
Zhu, D.Y.1
Jung, J.2
Song, D.3
Kohno, T.4
Wetherall, D.5
|