• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 229
Next 10 →

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones

by William Enck, Landon P. Cox, Jaeyeon Jung, et al. , 2010
"... Today’s smartphone operating systems fail to provide users with adequate control and visibility into how third-party applications use their private data. We present TaintDroid, an efficient, system-wide dynamic taint tracking and analysis system for the popular Android platform that can simultaneous ..."
Abstract - Cited by 527 (26 self) - Add to MetaCart
Today’s smartphone operating systems fail to provide users with adequate control and visibility into how third-party applications use their private data. We present TaintDroid, an efficient, system-wide dynamic taint tracking and analysis system for the popular Android platform that can

F4F : Taint Analysis of Framework-based Web Applications

by Manu Sridharan, Shay Artzi, Marco Pistoia, Salvatore Guarnieri, Ryan Berg - In OOPSLA , 2011
"... This paper presents F4F (Framework For Frameworks), a system for effective taint analysis of framework-based web applications. Most modern web applications utilize one or more web frameworks, which provide useful abstractions for common functionality. Due to extensive use of reflective language cons ..."
Abstract - Cited by 22 (2 self) - Add to MetaCart
This paper presents F4F (Framework For Frameworks), a system for effective taint analysis of framework-based web applications. Most modern web applications utilize one or more web frameworks, which provide useful abstractions for common functionality. Due to extensive use of reflective language

Research on Vulnerability Detection for Software Based on Taint Analysis

by Beihai Liang, Binbin Qu, Sheng Jiang, Chutian Ye
"... exists in most web sites. The main reason is the lack of effective validation and filtering mechanisms for user input data from web request. This paper explores vulnerability detection method which based on taint dependence analysis and implements a prototype system for Java Web program. We treat al ..."
Abstract - Add to MetaCart
exists in most web sites. The main reason is the lack of effective validation and filtering mechanisms for user input data from web request. This paper explores vulnerability detection method which based on taint dependence analysis and implements a prototype system for Java Web program. We treat

1 LETTER On the Deployment of Dynamic Taint Analysis for Application Communities ∗

by Hyung Chan Kim †a, Angelos Keromytis
"... SUMMARY Although software-attack detection via dynamic taint analysis (DTA) supports high coverage of program execution, it prohibitively degrades the performance of the monitored program. This letter explores the possibility of collaborative dynamic taint analysis among members of an application co ..."
Abstract - Add to MetaCart
SUMMARY Although software-attack detection via dynamic taint analysis (DTA) supports high coverage of program execution, it prohibitively degrades the performance of the monitored program. This letter explores the possibility of collaborative dynamic taint analysis among members of an application

Towards security testing with taint analysis and genetic algorithms

by Andrea Avancini, Fondazione Bruno Kessler–irst, Mariano Ceccato - in Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems. ACM
"... Cross site scripting is considered the major threat to the security of web applications. Removing vulnerabilities from existing web applications is a manual expensive task that would benefit from some level of automatic assistance. Static analysis represents a valuable support for security review, b ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
Cross site scripting is considered the major threat to the security of web applications. Removing vulnerabilities from existing web applications is a manual expensive task that would benefit from some level of automatic assistance. Static analysis represents a valuable support for security review

Defeating Memory Corruption Attacks using Object Level Dynamic Taint Analysis

by n.n. , 2009
"... Computer security is severely threatened by memory corruption vulnerabilities, such as buffer overflows and format string bugs. Information flow tracking or taint analysis has proved to be one of the most effective techniques in defending against a wide range of such attacks. It works by tracking t ..."
Abstract - Add to MetaCart
Computer security is severely threatened by memory corruption vulnerabilities, such as buffer overflows and format string bugs. Information flow tracking or taint analysis has proved to be one of the most effective techniques in defending against a wide range of such attacks. It works by tracking

Information Flow Control and Taint Analysis with Dependence Graphs

by unknown authors
"... Ensuring that the integrity of critical computation is not violated by untrusted code or the confidential data is protected is a complex problem for current software systems. We can observe two main directions to approach the problems: ..."
Abstract - Add to MetaCart
Ensuring that the integrity of critical computation is not violated by untrusted code or the confidential data is protected is a complex problem for current software systems. We can observe two main directions to approach the problems:

Detecting Kernel Level Keyloggers Through Dynamic Taint Analysis

by William Mary, Duy Le, Chuan Yue, Tyler Smart, Haining Wang, Duy Le, Chuan Yue, Tyler Smart, Haining Wang
"... Keyloggers as invisible keystroke recorders have posed a serious threat to user privacy and security. It is difficult to detect keyloggers, especially kernel keyloggers that operate at the operating system’s kernel level, because of their inconspicuous activities and flexible interception methods. I ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
. In this paper, we propose a framework using a dynamic taint analysis technique to detect kernel level keyloggers. Our design is originated from the observation that kernel keyloggers usually manipulate the data flow of a keyboard driver in order to record typed keystrokes. By tainting and monitoring

A critical review of dynamic taint analysis and forward symbolic execution

by Asankhaya Sharma , 2012
"... In this note, we describe a critical review of the paper titled “All you wanted to know about dynamics taint analysis and forward symbolic execution (but may have been afraid to ask) ” [1]. We analyze the paper using Paul Elder critical thinking framework [2]. We start with a summary of the paper an ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
In this note, we describe a critical review of the paper titled “All you wanted to know about dynamics taint analysis and forward symbolic execution (but may have been afraid to ask) ” [1]. We analyze the paper using Paul Elder critical thinking framework [2]. We start with a summary of the paper

All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask

by Edward J. Schwartz, Thanassis Avgerinos, David Brumley - In Proceedings of the IEEE Symposium on Security and Privacy , 2010
"... Abstract—Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analyses. Example applications of dynamic taint analysis and forward symbolic execution include malware analysis, input filter generation, test case generation, and vulnerability discove ..."
Abstract - Cited by 106 (5 self) - Add to MetaCart
Abstract—Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analyses. Example applications of dynamic taint analysis and forward symbolic execution include malware analysis, input filter generation, test case generation, and vulnerability
Next 10 →
Results 11 - 20 of 229
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University