A general dynamic information flow tracking framework for security applications

LC Lam, T Chiueh - … Annual Computer Security Applications …, 2006 - ieeexplore.ieee.org
… In summary, GIFT is an enabling technology that could be immediately applied to a wide …
to request a local application to perform sensitive system calls. To address this issue, Aussum …

Sensitive information tracking in commodity {IoT}

ZB Celik, L Babun, AK Sikder, H Aksu, G Tan… - 27th USENIX Security …, 2018 - usenix.org
… a rigorously grounded framework for evaluating the use of sensitive information in IoT …
Thereafter we perform efficient static analysis tracking information flow from sensitive sources to …

Securing web applications with static and dynamic information flow tracking

MS Lam, M Martin, B Livshits, J Whaley - Proceedings of the 2008 ACM …, 2008 - dl.acm.org
… as debugging and avoiding leakage of confidential data. It is a … information tracking analysis
based on a context-sensitive, … We show that we can exploit the use of common frameworks

Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones

W Enck, P Gilbert, S Han, V Tendulkar… - … on Computer Systems …, 2014 - dl.acm.org
applications in our 2010 study used sensitive data suspiciously; so did a similar fraction of
the tested applications in our 2012 study. … We seek to design a framework that allows users to …

MiniTracker: Large-Scale Sensitive Information Tracking in Mini Apps

W Li, B Yang, H Ye, L Xiang, Q Tao… - … on Dependable and …, 2023 - ieeexplore.ieee.org
… [68] propose a static analysis framework which seeks information leaks across the Java
and JavaScript language boundary. Bae et al. [69] present the first formal specification of …

Appintent: Analyzing sensitive data transmission in android for privacy leakage detection

Z Yang, M Yang, Y Zhang, G Gu, P Ning… - … conference on Computer …, 2013 - dl.acm.org
… However, transmission of sensitive data in itself does not … present a new analysis framework
called AppIntent. For each … Taint Tracking techniques [22, 41] track the sensitive data at …

Dynamic multi-process information flow tracking for web application security

S Nanda, LC Lam, T Chiueh - Proceedings of the 2007 ACM/IFIP …, 2007 - dl.acm.org
… % for the test web applications used in our performance study. … Our general information flow
tracking framework enables the … applications from leaking sensitive information. However, it …

TaintEraser: Protecting sensitive data leaks using application-level taint tracking

D Zhu, J Jung, D Song, T Kohno… - ACM SIGOPS Operating …, 2011 - dl.acm.org
… banned the use of the Google Desktop application on … Hence, we apply application-level
dynamic taint analysis for … a general framework for evaluating different kind of applications, we …

Secure program execution via dynamic information flow tracking

GE Suh, JW Lee, D Zhang, S Devadas - ACM Sigplan Notices, 2004 - dl.acm.org
sensitive data: Attackers can corrupt sensitive data without … In summary, control dependency
is not essential in detecting the … Our simulation framework is based on the SimpleScalar 3.0 …

Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps

S Arzt, S Rasthofer, C Fritz, E Bodden, A Bartel… - ACM sigplan …, 2014 - dl.acm.org
framework, while context, flow, field and object-sensitivity … These approaches track sensitive
“tainted” information through … Another challenge is posed by sources of sensitive information