Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security 2021
DOI: 10.1145/3460120.3484798
|View full text |Cite
|
Sign up to set email alerts
|

Statically Discovering High-Order Taint Style Vulnerabilities in OS Kernels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 42 publications
0
8
0
Order By: Relevance
“…For this reason, we need the ability to track data flow across syscalls. SUTURE [51] is a static analysis framework for pointsto analysis and data-flow analysis for the Linux kernel. It solves the multi-interaction problem using a summary-based approach.…”
Section: B Cross-syscall Points-to Analysis and Data-flow Analysismentioning
confidence: 99%
See 4 more Smart Citations
“…For this reason, we need the ability to track data flow across syscalls. SUTURE [51] is a static analysis framework for pointsto analysis and data-flow analysis for the Linux kernel. It solves the multi-interaction problem using a summary-based approach.…”
Section: B Cross-syscall Points-to Analysis and Data-flow Analysismentioning
confidence: 99%
“…Intended cross-syscall data-flows result from the multiinteraction characteristic of the kernel, as has been described in §II-B. Without the ability to model them, some memory errors may not be exploitable [51]. We address this challenge by leveraging the cross-syscall point-to analysis from [51], as well as our DFG-based cross-syscall data-flow analysis.…”
Section: Overviewmentioning
confidence: 99%
See 3 more Smart Citations