11th IEEE Symposium on Computers and Communications (ISCC'06) 2006
DOI: 10.1109/iscc.2006.158
|View full text |Cite
|
Sign up to set email alerts
|

TaintTrace: Efficient Flow Tracing with Dynamic Binary Rewriting

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
111
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 118 publications
(114 citation statements)
references
References 3 publications
1
111
0
Order By: Relevance
“…Haldar et al [16] propose a taint based approach for programs in Java, and Lam et al [19] propose a dynamic taint based analysis on C. Enck et al [11] provide a taint based approach to track third party Android applications. Cheng et al [6], Clause et al [7] and Zhu et al [31] propose software level dynamic tainting.…”
Section: Related Workmentioning
confidence: 99%
“…Haldar et al [16] propose a taint based approach for programs in Java, and Lam et al [19] propose a dynamic taint based analysis on C. Enck et al [11] provide a taint based approach to track third party Android applications. Cheng et al [6], Clause et al [7] and Zhu et al [31] propose software level dynamic tainting.…”
Section: Related Workmentioning
confidence: 99%
“…TaintTrace [5] is more efficient than TaintCheck. It is based on DynamoRIO [10] and consists of a number of optimizations to keep the overhead low.…”
Section: Related Workmentioning
confidence: 99%
“…One of its first practical instantiations was employed in detecting and defending against software attacks [19], while it has found many more applications since then. Currently, dynamic tracking approaches range from per-process taint tracking [6,8,14,19,21,25,29], to wholesystem tracking [9,10,20,27] using emulation environments and hardware extensions.…”
Section: Dynamic Taint Trackingmentioning
confidence: 99%