Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering 2016
DOI: 10.1145/2970276.2970299
|View full text |Cite
|
Sign up to set email alerts
|

StraightTaint: decoupled offline symbolic taint analysis

Abstract: Taint analysis has been widely applied in ex post facto security applications, such as attack provenance investigation, computer forensic analysis, and reverse engineering. Unfortunately, the high runtime overhead imposed by dynamic taint analysis makes it impractical in many scenarios. The key obstacle is the strict coupling of program execution and taint tracking logic code. To alleviate this performance bottleneck, recent work seeks to offload taint analysis from program execution and run it on a spare core… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
47
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 43 publications
(47 citation statements)
references
References 53 publications
0
47
0
Order By: Relevance
“…Their approach fixes the problem of taint loss which resulted from just-in-time translation first time. Ming et al [22] propose a full-featured offline taint analysis tool StraightTaint, which completely decouples the program execution and taint analysis, resulting in much lower execution slowdown. Dolan-Gavitt et al [23] present a full-system analysis tool PANDA that is based on QEMU emulator and has the ability to record and replay executions.…”
Section: Related Workmentioning
confidence: 99%
“…Their approach fixes the problem of taint loss which resulted from just-in-time translation first time. Ming et al [22] propose a full-featured offline taint analysis tool StraightTaint, which completely decouples the program execution and taint analysis, resulting in much lower execution slowdown. Dolan-Gavitt et al [23] present a full-system analysis tool PANDA that is based on QEMU emulator and has the ability to record and replay executions.…”
Section: Related Workmentioning
confidence: 99%
“…Dynamic binary instrumentation has been widely used for program performance profiling [35] and securityoriented execution monitoring tasks [17], [22]. Pin [20] and DynamoRIO [10] undertake lightweight instrumentation jobs, while Valgrind [24] is designed for more heavyweight instrumentation tasks, e.g., memory debugging.…”
Section: Related Workmentioning
confidence: 99%
“…Pin [20] and DynamoRIO [10] undertake lightweight instrumentation jobs, while Valgrind [24] is designed for more heavyweight instrumentation tasks, e.g., memory debugging. Among them, Pin is widely used for goal-driven binary security tasks, such as dynamic taint analysis [17], [22]. DynInst [12], [16] supports both static and dynamic binary instrumentation.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Instrumentation has many use cases such as (1) performance measurements, by checking the exact start/end time of interesting code portions; (2) debugging, by inspecting access to suspected areas like whenever a variable is being read/updated; (3) understanding the code structure by extracting its control flow graph or more complicated scenarios such as (4) taint analysis, by following data items which are affected by value of some tainted inputs; (5) information flow analysis, by keeping track of tainted locations separately; or (6) symbolic execution of program, by tracking and encoding the logic of executed instructions.…”
Section: Introductionmentioning
confidence: 99%