Proceedings of the 2018 3rd Joint International Information Technology,Mechanical and Electronic Engineering Conference (JIMEC 2018
DOI: 10.2991/jimec-18.2018.25
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Researching on Dynamic Taint Analysis Technique

Abstract: Taint analysis technique is the key technique means for analyzing the robustness of programs and vulnerability mining. By marking the data which are sensitive or untrusted, one can observe the flow of these tainted data during program execution, then determine whether the marked data affects the key nodes of the program. According to the implementation mechanism, the taint analysis can be divided into static taint analysis and dynamic taint analysis. As an auxiliary technique, it can be combined with mainstrea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 13 publications
(9 reference statements)
0
1
0
Order By: Relevance
“…Based on the above discussions, it is evident that integrated tools exhibit more prominent performance in terms of vulnerability coverage and detection accuracy. Detection tools that rely on a single detection method have certain limitations, such as the low path coverage in fuzzing [55], the path explosion in symbolic execution [56], and the challenges of over-tainting and under-tainting in taint analysis [57]. Integrated tools effectively integrate each method's strengths, address their deficiencies, and enhance the overall detection performance.…”
Section: Integration Capabilitiesmentioning
confidence: 99%
“…Based on the above discussions, it is evident that integrated tools exhibit more prominent performance in terms of vulnerability coverage and detection accuracy. Detection tools that rely on a single detection method have certain limitations, such as the low path coverage in fuzzing [55], the path explosion in symbolic execution [56], and the challenges of over-tainting and under-tainting in taint analysis [57]. Integrated tools effectively integrate each method's strengths, address their deficiencies, and enhance the overall detection performance.…”
Section: Integration Capabilitiesmentioning
confidence: 99%