Pointless tainting? evaluating the practicality of pointer tainting

A Slowinska, H Bos - Proceedings of the 4th ACM European conference …, 2009 - dl.acm.org
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking
(DIFT), which has recently become an important technique in system security. Pointer …

Real-World Buffer Overflow Protection for Userspace and Kernelspace.

M Dalton, H Kannan, C Kozyrakis - USENIX Security Symposium, 2008 - usenix.org
Despite having been around for more than 25 years, buffer overflow attacks are still a major
security threat for deployed software. Existing techniques for buffer overflow detection …

Compiler-instrumented, Dynamic {Secret-Redaction} of Legacy Processes for Attacker Deception

F Araujo, W Kevin - … USENIX Security Symposium (USENIX Security 15 …, 2015 - usenix.org
An enhanced dynamic taint-tracking semantics is presented and implemented, facilitating
fast and precise runtime secret redaction from legacy processes, such as those compiled …

Tainting is not pointless

M Dalton, H Kannan, C Kozyrakis - ACM SIGOPS Operating Systems …, 2010 - dl.acm.org
Pointer tainting is a form of Dynamic Information Flow Tracking used primarily to prevent
software security attacks such as buffer overflows. Researchers have also applied pointer …

[图书][B] Engineering cyber-deceptive software

F Araujo - 2016 - search.proquest.com
Abstract Language-based software cyber deception leverages the science of compiler and
programming language theory to equip software products with deceptive capabilities that …

An enhanced dynamic information flow tracking method with reverse stack execution

A Trikalinou, N Bourbakis - International Journal of Monitoring and …, 2015 - igi-global.com
Memory errors have long been a critical security issue primarily for C/C++ programming
languages and are still considered one of the top three most dangerous software errors …

Compiler-based attack origin tracking with dynamic taint analysis

O Braunsdorf, S Sessinghaus, J Horsch - International Conference on …, 2021 - Springer
Over the last decade, many exploit mitigations based on Control Flow Integrity (CFI) have
been developed to secure programs from being hijacked by attackers. However, most of …

An expert system interface and data requirements for the integrated product design and manufacturing process

DE Madison, CT Wu - 1987 IEEE Third International …, 1987 - ieeexplore.ieee.org
Database technology has been successfully applied to the traditional data processing
environment where data are represented by well-formatted records. There is a growing …

[PDF][PDF] The Design and Implementation of Dynamic Information Flow Tracking Systems For Software Security

M Dalton - 2010 - csl.stanford.edu
Computer security is in a crisis. Attackers are exploiting an ever-increasing range of software
vulnerabilities in critical public and private sector computer systems for massive financial …

Static secure page allocation for light-weight dynamic information flow tracking

JC Martinez Santos, Y Fei, ZJ Shi - Proceedings of the 2012 international …, 2012 - dl.acm.org
Dynamic information flow tracking (DIFT) is an effective security countermeasure for both low-
level memory corruptions and high-level semantic attacks. However, many software …