Taint-Exchange: A Generic System for Cross-process and Cross-host Taint Tracking (2011)

by Angeliki Zavou , Georgios Portokalidis , Angelos D. Keromytis
Venue:In Proc. of the 6 th IWSEC
Citations:5 - 3 self

Documents Related by Co-Citation

110 Lift: A low-overhead practical information flow tracking system for detecting security attacks – F Qin, C Wang, Z Li, H seop Kim, Y Zhou, Y Wu - 2006
13 TaintEraser: Protecting Sensitive Data Leaks Using Application-Level Taint Tracking – David (yu Zhu, Tadayoshi Kohno, Jaeyeon Jung, Dawn Song, David Wetherall - 2011
485 Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software – James Newsome, Dawn Song - 2005
157 Making information flow explicit in HiStar – Nickolai Zeldovich, Silas Boyd-wickizer, Eddie Kohler, David Mazières - 2006
13 libdft: Practical Dynamic Data Flow Tracking for Commodity Systems – Vasileios P. Kemerlis, Georgios Portokalidis, Kangkook Jee, Angelos D. Keromytis
8 DBTaint: Cross-Application Information Flow Tracking via Databases ∗ – Benjamin Davis, Hao Chen
79 Dytan: A Generic Dynamic Taint Analysis Framework – James Clause, Wanchun Li, Ro Orso - 2007
17 DTA++: Dynamic taint analysis with targeted control-flow propagation – M G Kang, S McCamant, P Poosankam, D Song - 2011
24 Automating configuration troubleshooting with dynamic information flow analysis – Mona Attariyan, Jason Flinn
599 Pin: building customized program analysis tools with dynamic instrumentation – Chi-keung Luk, Robert Cohn, Robert Muth, Harish Patil, Artur Klauser, Geoff Lowney, Steven Wallace, Vijay Janapa, Reddi Kim Hazelwood - 2005
73 Argos: an emulator for fingerprinting zero-day attacks – Georgios Portokalidis, Asia Slowinska, Herbert Bos - 2006
183 TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones – William Enck, Landon P. Cox, Jaeyeon Jung, et al. - 2010
17 Real-World Buffer Overflow Protection for Userspace & Kernelspace – Michael Dalton, Hari Kannan, Christos Kozyrakis
64 Practical taint-based protection using demand emulation – Alex Ho, Michael Fetterman, Christopher Clark, Andrew Warfield, Steven Hand - 2006
149 Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks – Wei Xu, Sandeep Bhatkar, R. Sekar - 2006
150 Understanding data lifetime via whole system simulation – Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, Mendel Rosenblum - 2004
10 permission. Towards Practical Taint Tracking – Andrey Ermolinskiy, Sachin Katti, Scott Shenker, Lisa L Fowler, Murphy Mccauley, Andrey Ermolinskiy, Sachin Katti, Scott Shenker, Lisa Fowler, Murphy Mccauley - 2010
33 Return-Oriented Programming without Returns – Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy - 2010
5 A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware – Kangkook Jee, Georgios Portokalidis, Vasileios P. Kemerlis, Soumyadeep Ghosh, David I. August, Angelos D. Keromytis - 2012