2012
DOI: 10.1145/2365864.2151042
|View full text |Cite
|
Sign up to set email alerts
|

libdft

Abstract: Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they propagate during program execution. DFT has been repeatedly implemented by a variety of tools for numerous purposes, including protection from zero-day and cross-site scripting attacks, detection and prevention of information leaks, and for the analysis of legitimate and malicious software. We present libdft, a dynamic DFT framework that unlike previous work is at once fast, reusable, and works with commodity software and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 45 publications
(19 citation statements)
references
References 19 publications
0
19
0
Order By: Relevance
“…One of its first practical instantiations was employed in detecting and defending against software attacks [19], while it has found many more applications since then. Currently, dynamic tracking approaches range from per-process taint tracking [6,8,14,19,21,25,29], to wholesystem tracking [9,10,20,27] using emulation environments and hardware extensions.…”
Section: Dynamic Taint Trackingmentioning
confidence: 99%
See 4 more Smart Citations
“…One of its first practical instantiations was employed in detecting and defending against software attacks [19], while it has found many more applications since then. Currently, dynamic tracking approaches range from per-process taint tracking [6,8,14,19,21,25,29], to wholesystem tracking [9,10,20,27] using emulation environments and hardware extensions.…”
Section: Dynamic Taint Trackingmentioning
confidence: 99%
“…Most application-level taint tracking tools, like TaintCheck [19], TaintTrace [6], libdft [14], Dytan [8], and LIFT [21] use dynamic binary instrumentation (DBI) frameworks, like PIN [15], StarDBT [5] and Valgrind [18]. While quite effective and useful, as they do not require any modifications to source code or customized hardware, they impose significant impact on the performance, as every instruction needs to be instrumented, and additional storage, usually called shadow memory, is required for storing the tags.…”
Section: Single-process Taint Trackingmentioning
confidence: 99%
See 3 more Smart Citations