Taint-Exchange: A Generic System for Cross-process and Cross-host Taint Tracking (2011)

by Angeliki Zavou , Georgios Portokalidis , Angelos D. Keromytis
Venue:In Proc. of the 6 th IWSEC
Citations:5 - 3 self

Active Bibliography

13 libdft: Practical Dynamic Data Flow Tracking for Commodity Systems – Vasileios P. Kemerlis, Georgios Portokalidis, Kangkook Jee, Angelos D. Keromytis
5 A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware – Kangkook Jee, Georgios Portokalidis, Vasileios P. Kemerlis, Soumyadeep Ghosh, David I. August, Angelos D. Keromytis - 2012
183 TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones – William Enck, Landon P. Cox, Jaeyeon Jung, et al. - 2010
1 On Information Flow for Intrusion Detection: What if Accurate Full-system Dynamic Information Flow Tracking Was Possible? ABSTRACT – Mohammed I. Al-saleh
CloudFence: Data Flow Tracking as a Cloud Service – Vasileios P. Kemerlis, Angeliki Zavou, Michalis Polychronakis, Angelos D. Keromytis
Intel Labs Seattle – David (yu Zhu, Jaeyeon Jung, Dawn Song, Tadayoshi Kohno, David Wetherall
13 TaintEraser: Protecting Sensitive Data Leaks Using Application-Level Taint Tracking – David (yu Zhu, Tadayoshi Kohno, Jaeyeon Jung, Dawn Song, David Wetherall - 2011
(Date) Analysis and Experiences with Information Flow Tracking as a Practical Means to Prevent Data Leakage – Lisa L Fowler, Lisa L. Fowler, Lisa L. Fowler - 2011
libdft: Practical Dynamic Data Flow Tracking for Commodity Systems – Vasileiosp. Kemerlis Georgiosportokalidis, Kangkookjee Angelosd Keromytis
12 Neon: System Support for Derived Data Management – Qing Zhang, John Mccullough, Justin Ma, Nabil Schear, Michael Vrable, Amin Vahdat, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage
7 Minemu: The World’s Fastest Taint Tracker – Erik Bosman, Asia Slowinska, Herbert Bos - 2011
ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking – Kangkook Jee, Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis
28 Pointless Tainting? Evaluating the Practicality of Pointer Tainting – Asia Slowinska, Herbert Bos - 2009
23 Measuring Channel Capacity to Distinguish Undue Influence – James Newsome, Stephen Mccamant, Dawn Song
7 From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware – Haibo Chen, Xi Wu, Liwei Yuan, Binyu Zang, Pen-chung Yew, Frederic T. Chong - 2008
Leapfrog: Enhancing Information Protection in Commodity Applications with Dataflow Control – XiaoFeng Wang, Zhuowei Li, Rui Wang
49 TightLip: Keeping applications from spilling the beans – Aydan R. Yumerefendi, Benjamin Mickle, On P. Cox - 2007
CMU-CyLab-08-005 – James Newsome, Dawn Song, James Newsome, Dawn Song - 2008
DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis – Lok Kwong, Yan Heng Yin