Dataflow tracking with Dynamic Taint Analysis (DTA) is an important method in systems security with many applications, including exploit analysis, guided fuzzing, and side-channel information leak detection. However, DTA is fundamentally limited by the Boolean nature of taint labels, which provide no information about the significance of detected dataflows and lead to false positives/negatives on complex real world programs. We introduce proximal gradient analysis (PGA), a novel, theoretically grounded approach that can track more accurate and fine-grained dataflow information. PGA uses proximal gradients, a generalization of gradients for non-differentiable functions, to precisely compose gradients over non-differentiable operations in pro...
Taint-tracking is emerging as a general technique in software security to complement virtualization ...
TaintTrace is a high performance flow tracing tool that protects systems against security exploits. ...
Malicious and unintentionally insecure Android applications can leak users ’ sen-sitive data. One ap...
Static data flow analysis is an indispensable tool for finding potentially malicious data leaks in s...
Static data flow analysis is an indispensable tool for finding potentially malicious data leaks in s...
textMany challenges in software quality can be tackled with dynamic analysis. However, these techniq...
Static analysis is a powerful tool for detecting security vulnerabilities and other programming prob...
Detecting bugs plays a significant role in software development. Bugs may lead to unexpected behavio...
International audienceIn Side-Channel Analysis (SCA), several papers have shown that neural networks...
Taint analysis detects if data coming from a source, such as user input, flows into a sink, such as ...
Dynamic taint analysis (DTA) is a technique used for tracking information flow by propagating taint ...
Taint analysis detects if data coming from a source, such as user input, flows into a sink, such as ...
Taint analysis has a wide variety of compelling applica-tions in security tasks, from software attac...
Taint tracking has been successfully deployed in a range of security applications to track data depe...
Detection of Data Flow Anomalies There are static or dynamic methods to detect data flow anomalies i...
Taint-tracking is emerging as a general technique in software security to complement virtualization ...
TaintTrace is a high performance flow tracing tool that protects systems against security exploits. ...
Malicious and unintentionally insecure Android applications can leak users ’ sen-sitive data. One ap...
Static data flow analysis is an indispensable tool for finding potentially malicious data leaks in s...
Static data flow analysis is an indispensable tool for finding potentially malicious data leaks in s...
textMany challenges in software quality can be tackled with dynamic analysis. However, these techniq...
Static analysis is a powerful tool for detecting security vulnerabilities and other programming prob...
Detecting bugs plays a significant role in software development. Bugs may lead to unexpected behavio...
International audienceIn Side-Channel Analysis (SCA), several papers have shown that neural networks...
Taint analysis detects if data coming from a source, such as user input, flows into a sink, such as ...
Dynamic taint analysis (DTA) is a technique used for tracking information flow by propagating taint ...
Taint analysis detects if data coming from a source, such as user input, flows into a sink, such as ...
Taint analysis has a wide variety of compelling applica-tions in security tasks, from software attac...
Taint tracking has been successfully deployed in a range of security applications to track data depe...
Detection of Data Flow Anomalies There are static or dynamic methods to detect data flow anomalies i...
Taint-tracking is emerging as a general technique in software security to complement virtualization ...
TaintTrace is a high performance flow tracing tool that protects systems against security exploits. ...
Malicious and unintentionally insecure Android applications can leak users ’ sen-sitive data. One ap...