Proceedings 2019 Network and Distributed System Security Symposium 2019
DOI: 10.14722/ndss.2019.23339
|View full text |Cite
|
Sign up to set email alerts
|

One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics

Abstract: Dynamic binary taint analysis has wide applications in the security analysis of commercial-off-the-shelf (COTS) binaries. One of the key challenges in dynamic binary analysis is to specify the taint rules that capture how taint information propagates for each instruction on an architecture. Most of the existing solutions specify taint rules using a deductive approach by summarizing the rules manually after analyzing the instruction semantics. Intuitively, taint propagation reflects on how an instruction input … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 22 publications
(17 citation statements)
references
References 42 publications
0
17
0
Order By: Relevance
“…This process requires tremendous engineering effort and thus, many researchers consider it too costly to investigate. TaintInduce (by the National University of Singapore and the Chinese Academy of Sciences) 5 is a project to automatically generate taint rules (or data-flow properties) without manual specifications; it infers taint rules based on observations of instruction executions. In addition, TaintInduce proposes a common definition and API for taint rules, enabling follow-up work to be built on a common knowledge base.…”
Section: Discussionmentioning
confidence: 99%
“…This process requires tremendous engineering effort and thus, many researchers consider it too costly to investigate. TaintInduce (by the National University of Singapore and the Chinese Academy of Sciences) 5 is a project to automatically generate taint rules (or data-flow properties) without manual specifications; it infers taint rules based on observations of instruction executions. In addition, TaintInduce proposes a common definition and API for taint rules, enabling follow-up work to be built on a common knowledge base.…”
Section: Discussionmentioning
confidence: 99%
“…There has been some encouraging recent work on automated synthesis of semantic specifications for specific ISAs such as x86 [34,39]. TaintInduce [14] shows that higher level semantics (i.e., taint propagation rules) can be dynamically inferred for an ISA. However, these approaches focus on simple instructions, such as arithmetic and basic logical operations.…”
Section: Creating Virtual Execution Enginesmentioning
confidence: 99%
“…These limitations of taint severely affect its applicability to real-world programs. A recent work TaintInduce [18] has proposed to learn the taint propagation rules instead of manually specifying them. This can increase the accuracy of individual rules, but the error accumulation and large overhead issues still remain, due to propagation-based design.…”
Section: Dynamic Taint Analysis (Dta)mentioning
confidence: 99%
“…However, it incurs large overhead and suffers from overtaint and undertaint issues. To address these issues, TaintInduce [18] proposes to learn platform-specific taint propagation rules from (input, output) pairs of instructions. Their approach learns propagation rules based on a template, and uses an algorithm to reduce the task to learning different input sets and pre-conditions for propagating the taint tags.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation