permission. Towards Practical Taint Tracking (2010)

by Andrey Ermolinskiy , Sachin Katti , Scott Shenker , Lisa L Fowler , Murphy Mccauley , Andrey Ermolinskiy , Sachin Katti , Scott Shenker , Lisa Fowler , Murphy Mccauley
Citations:10 - 0 self

Documents Related by Co-Citation

197 Secure Program Execution via Dynamic Information Flow Tracking – G. Edward Suh, Jaewook Lee, Srinivas Devadas - 2004
183 TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones – William Enck, Landon P. Cox, Jaeyeon Jung, et al. - 2010
150 Understanding data lifetime via whole system simulation – Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, Mendel Rosenblum - 2004
88 Raksha: A Flexible Information Flow Architecture for Software Security – Michael Dalton, Hari Kannan, Christos Kozyrakis - 2007
34 Flexitaint: A programmable accelerator for dynamic taint propagation – Guru Venkataramani, Ioannis Doudalis, Yan Solihin, Milos Prvulovic - 2008
28 Pointless Tainting? Evaluating the Practicality of Pointer Tainting – Asia Slowinska, Herbert Bos - 2009
64 Practical taint-based protection using demand emulation – Alex Ho, Michael Fetterman, Christopher Clark, Andrew Warfield, Steven Hand - 2006
149 Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks – Wei Xu, Sandeep Bhatkar, R. Sekar - 2006
245 Vigilante: End-to-End Containment of Internet Worm Epidemics – Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham - 2008
115 Panorama: Capturing system-wide information flow for malware detection and analysis – Heng Yin, Dawn Song, Manuel Egele, Christopher Kruegel, Engin Kirda - 2007
13 TaintEraser: Protecting Sensitive Data Leaks Using Application-Level Taint Tracking – David (yu Zhu, Tadayoshi Kohno, Jaeyeon Jung, Dawn Song, David Wetherall - 2011
449 JFlow: Practical Mostly-Static Information Flow Control – Andrew C. Myers - 1999
485 Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software – James Newsome, Dawn Song - 2005
157 Making information flow explicit in HiStar РNickolai Zeldovich, Silas Boyd-wickizer, Eddie Kohler, David Mazi̬res - 2006
11 Decoupling dynamic information flow tracking with a dedicated coprocessor – Hari Kannan, Michael Dalton, Christos Kozyrakis - 2009
170 Minos: Control Data Attack Prevention Orthogonal to Memory Model – Jedidiah R. Crandall, Frederic T. Chong - 2004
79 Dytan: A Generic Dynamic Taint Analysis Framework – James Clause, Wanchun Li, Ro Orso - 2007
73 Argos: an emulator for fingerprinting zero-day attacks – Georgios Portokalidis, Asia Slowinska, Herbert Bos - 2006
110 Lift: A low-overhead practical information flow tracking system for detecting security attacks – F Qin, C Wang, Z Li, H seop Kim, Y Zhou, Y Wu - 2006