Generic taint analysis is a pivotal technique in software security. However, it suffers from staggeringly high overhead. In this paper, we explore the hypothesis whether just-in-time (JIT) generation of fast paths for tracking taint can enhance the performance. To this end, we present the Taint Rabbit, which supports highly customizable user-defined taint policies and combines a JIT with fast context switching. Our experimental results suggest that this combination outperforms notable existing implementations of generic taint analysis and bridges the performance gap to specialized trackers. For instance, Dytan incurs an average overhead of 237x, while the Taint Rabbit achieves 1.7x on the same set of benchmarks. This compares favorably to t...
Taint tracking is a popular security mechanism for tracking data-flow dependencies, both in high-lev...
Dynamic taint analysis (DTA) has been heavily used by security researchers for various tasks, includ...
Dynamic taint analysis (DTA) has been heavily used by security researchers for various tasks, includ...
Dynamic taint analysis is a fundamental technique in software security that tracks the flow of inter...
Taint analysis has a wide variety of compelling applica-tions in security tasks, from software attac...
TaintTrace is a high performance flow tracing tool that protects systems against security exploits. ...
Taint tracking has been successfully deployed in a range of security applications to track data depe...
Software vulnerabilities have had a devastating effect on the Internet. Worms such as CodeRed and Sl...
Software vulnerabilities have had a devastating effect on the Internet. Worms such as CodeRed and Sl...
Software vulnerabilities have had a devastating effect on the Internet. Worms such as CodeRed and Sl...
Abstract. Dynamic taint analysis is a powerful technique to detect memory cor-ruption attacks. Howev...
Taint-tracking is emerging as a general technique in software security to complement virtualization ...
Taint analysis is a popular method in software analysis field including vulnerability/malware analys...
Dynamic taint analysis is a powerful technique to detect memory corruption attacks. However, with ty...
AbstractThe evolution of computer science has exposed us to the growing gravity of security problems...
Taint tracking is a popular security mechanism for tracking data-flow dependencies, both in high-lev...
Dynamic taint analysis (DTA) has been heavily used by security researchers for various tasks, includ...
Dynamic taint analysis (DTA) has been heavily used by security researchers for various tasks, includ...
Dynamic taint analysis is a fundamental technique in software security that tracks the flow of inter...
Taint analysis has a wide variety of compelling applica-tions in security tasks, from software attac...
TaintTrace is a high performance flow tracing tool that protects systems against security exploits. ...
Taint tracking has been successfully deployed in a range of security applications to track data depe...
Software vulnerabilities have had a devastating effect on the Internet. Worms such as CodeRed and Sl...
Software vulnerabilities have had a devastating effect on the Internet. Worms such as CodeRed and Sl...
Software vulnerabilities have had a devastating effect on the Internet. Worms such as CodeRed and Sl...
Abstract. Dynamic taint analysis is a powerful technique to detect memory cor-ruption attacks. Howev...
Taint-tracking is emerging as a general technique in software security to complement virtualization ...
Taint analysis is a popular method in software analysis field including vulnerability/malware analys...
Dynamic taint analysis is a powerful technique to detect memory corruption attacks. However, with ty...
AbstractThe evolution of computer science has exposed us to the growing gravity of security problems...
Taint tracking is a popular security mechanism for tracking data-flow dependencies, both in high-lev...
Dynamic taint analysis (DTA) has been heavily used by security researchers for various tasks, includ...
Dynamic taint analysis (DTA) has been heavily used by security researchers for various tasks, includ...