A number of systems employ dynamic taint analysis to detect overwrite attacks in commodity software. These sys-tems are based on the premise that low-integrity inputs should not control values such as function pointers and re-turn addresses. Unfortunately, there are several program-ming constructs that can cause false positives and false neg-atives in these systems, which are currently handled by man-ual annotation, ad-hoc rules, or not at all. In this work we propose to use channel capacity, a quan-titative measure of information flow, as a quantitative mea-sure of control. When measuring control, we refer to this measure as influence. We use influence as a theoretical tool to formally investigate programming constructs known to be problem...
Software side-channel attacks are able to recover confidential information by observing non-function...
Beginning with the work of Forrest et al, several researchers have developed intrusion detection tec...
textMany challenges in software quality can be tackled with dynamic analysis. However, these techniq...
A number of systems employ dynamic taint analysis to detect overwrite attacks in commodity software....
A common attack point in a program is the input exposed to the user. The adversary crafts a maliciou...
It is difficult to dynamically assess the runtime trustworthiness of a software program. Improperly ...
Taint analysis is a form of data flow analysis aiming at secure information flow. For example, unche...
International audience—Code obfuscation is designed to impede the reverse engineering of a binary so...
Although software-attack detection via dynamic taint analysis (DTA) supports high coverage of progra...
Dynamic taint analysis is a fundamental technique in software security that tracks the flow of inter...
Taint-tracking is emerging as a general technique in software security to complement virtualization ...
Software vulnerabilities have had a devastating effect on the Internet. Worms such as CodeRed and Sl...
Software vulnerabilities have had a devastating effect on the Internet. Worms such as CodeRed and Sl...
This paper provides a taxonomy of runtime taint tracking approaches for managed code, such as code w...
4 commodity software, and 5 Botnet malware. We also experiment with vanilla DTA and DYTAN's DTA,...
Software side-channel attacks are able to recover confidential information by observing non-function...
Beginning with the work of Forrest et al, several researchers have developed intrusion detection tec...
textMany challenges in software quality can be tackled with dynamic analysis. However, these techniq...
A number of systems employ dynamic taint analysis to detect overwrite attacks in commodity software....
A common attack point in a program is the input exposed to the user. The adversary crafts a maliciou...
It is difficult to dynamically assess the runtime trustworthiness of a software program. Improperly ...
Taint analysis is a form of data flow analysis aiming at secure information flow. For example, unche...
International audience—Code obfuscation is designed to impede the reverse engineering of a binary so...
Although software-attack detection via dynamic taint analysis (DTA) supports high coverage of progra...
Dynamic taint analysis is a fundamental technique in software security that tracks the flow of inter...
Taint-tracking is emerging as a general technique in software security to complement virtualization ...
Software vulnerabilities have had a devastating effect on the Internet. Worms such as CodeRed and Sl...
Software vulnerabilities have had a devastating effect on the Internet. Worms such as CodeRed and Sl...
This paper provides a taxonomy of runtime taint tracking approaches for managed code, such as code w...
4 commodity software, and 5 Botnet malware. We also experiment with vanilla DTA and DYTAN's DTA,...
Software side-channel attacks are able to recover confidential information by observing non-function...
Beginning with the work of Forrest et al, several researchers have developed intrusion detection tec...
textMany challenges in software quality can be tackled with dynamic analysis. However, these techniq...