libdft: Practical Dynamic Data Flow Tracking for Commodity Systems

by Vasileios P. Kemerlis , Georgios Portokalidis , Kangkook Jee , Angelos D. Keromytis
Citations:13 - 8 self

Active Bibliography

5 A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware – Kangkook Jee, Georgios Portokalidis, Vasileios P. Kemerlis, Soumyadeep Ghosh, David I. August, Angelos D. Keromytis - 2012
libdft: Practical Dynamic Data Flow Tracking for Commodity Systems – Vasileiosp. Kemerlis Georgiosportokalidis, Kangkookjee Angelosd Keromytis
1 On Information Flow for Intrusion Detection: What if Accurate Full-system Dynamic Information Flow Tracking Was Possible? ABSTRACT – Mohammed I. Al-saleh
188 TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones – William Enck, Landon P. Cox, Jaeyeon Jung, et al. - 2010
5 Taint-Exchange: A Generic System for Cross-process and Cross-host Taint Tracking – Angeliki Zavou, Georgios Portokalidis, Angelos D. Keromytis - 2011
7 Minemu: The World’s Fastest Taint Tracker – Erik Bosman, Asia Slowinska, Herbert Bos - 2011
ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking – Kangkook Jee, Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis
(Date) Analysis and Experiences with Information Flow Tracking as a Practical Means to Prevent Data Leakage – Lisa L Fowler, Lisa L. Fowler, Lisa L. Fowler - 2011
7 From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware – Haibo Chen, Xi Wu, Liwei Yuan, Binyu Zang, Pen-chung Yew, Frederic T. Chong - 2008
Data Tethers: Preventing Information Leakage by Enforcing Environmental Data Access Policies – Charles Fleming, Peter Peterson, Erik Kline, Peter Reiher
13 TaintEraser: Protecting Sensitive Data Leaks Using Application-Level Taint Tracking – David (yu Zhu, Tadayoshi Kohno, Jaeyeon Jung, Dawn Song, David Wetherall - 2011
Intel Labs Seattle – David (yu Zhu, Jaeyeon Jung, Dawn Song, Tadayoshi Kohno, David Wetherall
12 Neon: System Support for Derived Data Management – Qing Zhang, John Mccullough, Justin Ma, Nabil Schear, Michael Vrable, Amin Vahdat, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage
1 Testudo: Heavyweight Security Analysis via Statistical Sampling – Joseph L. Greathouse, Ilya Wagner, David A. Ramos, Gautam Bhatnagar, Todd Austin, Valeria Bertacco, Seth Pettie
A Verified Information-Flow Architecture – Arthur Azevedo de Amorim, Nathan Collins, André DeHon, Delphine Demange, Cătălin Hritcu, David Pichardie, Benjamin C. Pierce , Randy Pollack, Andrew Tolmach - 2013
28 Pointless Tainting? Evaluating the Practicality of Pointer Tainting – Asia Slowinska, Herbert Bos - 2009
115 Panorama: Capturing system-wide information flow for malware detection and analysis – Heng Yin, Dawn Song, Manuel Egele, Christopher Kruegel, Engin Kirda - 2007
23 Measuring Channel Capacity to Distinguish Undue Influence – James Newsome, Stephen Mccamant, Dawn Song
1 THE DESIGN AND IMPLEMENTATION OF HARDWARE SYSTEMS FOR INFORMATION FLOW TRACKING – Hari Kannan, Subhasish Mitra, Oyekunle Olukotun, Patricia J. Gumport, Vice Provost, Graduate Education