We present a simple architectural mechanism called dynamic information flow tracking that can significantly improve the security of computing systems with negligible performance overhead. Dynamic information flow tracking protects programs against malicious software attacks by identifying spurious information flows from untrusted I/O and restricting the usage of the spurious information. Every security attack to take control of a program needs to transfer the program’s control to malevolent code. In our approach, the operating system identifies a set of input channels as spurious, and the processor tracks all information flows from those inputs. A broad range of attacks are effectively defeated by checking the use of the spurious values as ...
We present program shepherding, a method for monitoring control flow transfers dur-ing program execu...
How do we guarantee that a piece of code, possibly originating from third party, does not jeopardize...
Taint-tracking is emerging as a general technique in software security to complement virtualization ...
We present a simple architectural mechanism called dynamic information flow tracking that can signif...
We present a simple architectural mechanism called dynamicinformation flow tracking that can signifi...
Dynamic information flow tracking (DIFT) has been proven an effective technique to track data usage;...
Recent micro-architectural research has proposed various schemes to enhance processors with addition...
Abstract. We present a hybrid approach to information flow security where security violations are de...
Dynamic information flow tracking (also known as taint tracking) is an appealing approach to combat ...
Although static systems for information flow security are well-studied, few works address run-time i...
A common attack point in a program is the input exposed to the user. The adversary crafts a maliciou...
A common attack point in a program is the input exposed to the user. The adversary crafts a maliciou...
One of the central security concerns in managing an organization is protecting the flow of sensitive...
A new approach to dynamic information flow analysis is presented that can be used to detect and debu...
We present a new approach for tracking programs ’ use of data through arbitrary calculations, to det...
We present program shepherding, a method for monitoring control flow transfers dur-ing program execu...
How do we guarantee that a piece of code, possibly originating from third party, does not jeopardize...
Taint-tracking is emerging as a general technique in software security to complement virtualization ...
We present a simple architectural mechanism called dynamic information flow tracking that can signif...
We present a simple architectural mechanism called dynamicinformation flow tracking that can signifi...
Dynamic information flow tracking (DIFT) has been proven an effective technique to track data usage;...
Recent micro-architectural research has proposed various schemes to enhance processors with addition...
Abstract. We present a hybrid approach to information flow security where security violations are de...
Dynamic information flow tracking (also known as taint tracking) is an appealing approach to combat ...
Although static systems for information flow security are well-studied, few works address run-time i...
A common attack point in a program is the input exposed to the user. The adversary crafts a maliciou...
A common attack point in a program is the input exposed to the user. The adversary crafts a maliciou...
One of the central security concerns in managing an organization is protecting the flow of sensitive...
A new approach to dynamic information flow analysis is presented that can be used to detect and debu...
We present a new approach for tracking programs ’ use of data through arbitrary calculations, to det...
We present program shepherding, a method for monitoring control flow transfers dur-ing program execu...
How do we guarantee that a piece of code, possibly originating from third party, does not jeopardize...
Taint-tracking is emerging as a general technique in software security to complement virtualization ...