2020 IEEE Symposium on Security and Privacy (SP) 2020
DOI: 10.1109/sp40000.2020.00022
|View full text |Cite
|
Sign up to set email alerts
|

Neutaint: Efficient Dynamic Taint Analysis with Neural Networks

Abstract: Dynamic taint analysis (DTA) is widely used by various applications to track information flow during runtime execution. Existing DTA techniques use rule-based taint-propagation, which is neither accurate (i.e., high false positive rate) nor efficient (i.e., large runtime overhead). It is hard to specify taint rules for each operation while covering all corner cases correctly. Moreover, the overtaint and undertaint errors can accumulate during the propagation of taint information across multiple operations. Fin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 42 publications
(21 citation statements)
references
References 27 publications
0
21
0
Order By: Relevance
“…Because the bytes related to a path constraint are usually a small portion of an input, some other fuzzers utilize taint analysis to build the relationships between input bytes and path constraints [8,17,20,27,36]. Taint tracking can identify promising input bytes that affect program's certain operations [10,14,16,26,29,33]. When resolving a path constraint, fuzzing only needs to mutate the related bytes so that they improve the efficiency of passing raodrocks.…”
Section: Path Constraintsmentioning
confidence: 99%
“…Because the bytes related to a path constraint are usually a small portion of an input, some other fuzzers utilize taint analysis to build the relationships between input bytes and path constraints [8,17,20,27,36]. Taint tracking can identify promising input bytes that affect program's certain operations [10,14,16,26,29,33]. When resolving a path constraint, fuzzing only needs to mutate the related bytes so that they improve the efficiency of passing raodrocks.…”
Section: Path Constraintsmentioning
confidence: 99%
“…The most closely related work has used deep learning to analyze the information flow in programs for more efficient taint tracking [37] or vulnerability detection [24] in C. In these projects, ML models must identify key points in the program to analyze the information flow, relying on the highly static nature of C programs. In our work, we focus on DOM XSS vulnerabilities in the browser, which predominantly executes dynamic JavaScript code.…”
Section: Machine Learning In Program Analysismentioning
confidence: 99%
“…Inspired by advances in program neural smoothing [94,95] and SCA based on neural networks [54,85,118,123], we seek to overcome question "which program point leaks side channel information" by answering the following question:…”
Section: Fault Localization With Neural Attentionmentioning
confidence: 99%