… a rigorously grounded framework for evaluating the use of sensitiveinformation in IoT … Thereafter we perform efficient static analysistracking information flow from sensitive sources to …
… as debugging and avoiding leakage of confidentialdata. It is a … informationtrackinganalysis based on a context-sensitive, … We show that we can exploit the use of common frameworks …
W Enck, P Gilbert, S Han, V Tendulkar… - … on Computer Systems …, 2014 - dl.acm.org
… applications in our 2010 study used sensitivedata suspiciously; so did a similar fraction of the tested applications in our 2012 study. … We seek to design a framework that allows users to …
W Li, B Yang, H Ye, L Xiang, Q Tao… - … on Dependable and …, 2023 - ieeexplore.ieee.org
… [68] propose a static analysisframework which seeks information leaks across the Java and JavaScript language boundary. Bae et al. [69] present the first formal specification of …
… However, transmission of sensitivedata in itself does not … present a new analysisframework called AppIntent. For each … Taint Tracking techniques [22, 41] track the sensitivedata at …
S Nanda, LC Lam, T Chiueh - Proceedings of the 2007 ACM/IFIP …, 2007 - dl.acm.org
… % for the test web applications used in our performance study. … Our general information flow trackingframework enables the … applications from leaking sensitiveinformation. However, it …
D Zhu, J Jung, D Song, T Kohno… - ACM SIGOPS Operating …, 2011 - dl.acm.org
… banned the use of the Google Desktopapplication on … Hence, we applyapplication-level dynamic taint analysis for … a general framework for evaluating different kind of applications, we …
… sensitivedata: Attackers can corrupt sensitivedata without … In summary, control dependency is not essential in detecting the … Our simulation framework is based on the SimpleScalar 3.0 …
… framework, while context, flow, field and object-sensitivity … These approaches tracksensitive “tainted” information through … Another challenge is posed by sources of sensitiveinformation …