Hardware information flow tracking

W Hu, A Ardeshiricham, R Kastner - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …

{FlowFence}: Practical data protection for emerging {IoT} application frameworks

E Fernandes, J Paupore, A Rahmati… - 25th USENIX security …, 2016 - usenix.org
Emerging IoT programming frameworks enable building apps that compute on sensitive
data produced by smart homes and wearables. However, these frameworks only support …

Chex: statically vetting android apps for component hijacking vulnerabilities

L Lu, Z Li, Z Wu, W Lee, G Jiang - … of the 2012 ACM conference on …, 2012 - dl.acm.org
An enormous number of apps have been developed for Android in recent years, making it
one of the most popular mobile operating systems. However, the quality of the booming …

Analyzing inter-application communication in Android

E Chin, AP Felt, K Greenwood, D Wagner - Proceedings of the 9th …, 2011 - dl.acm.org
Modern smartphone operating systems support the development of third-party applications
with open system APIs. In addition to an open API, the Android operating system also …

{SLEUTH}: Real-time attack scenario reconstruction from {COTS} audit data

MN Hossain, SM Milajerdi, J Wang, B Eshete… - 26th USENIX Security …, 2017 - usenix.org
We present an approach and system for real-time reconstruction of attack scenarios on an
enterprise host. To meet the scalability and real-time needs of the problem, we develop a …

Protracer: Towards practical provenance tracing by alternating between logging and tainting

S Ma, X Zhang, D Xu - 23rd Annual Network And …, 2016 - scholarship.libraries.rutgers.edu
ProTracer: towards practical provenance tracing by alternating between logging and
tainting Page 1 Please do not remove this page ProTracer: towards practical provenance …

[PDF][PDF] Permission re-delegation: Attacks and defenses.

AP Felt, HJ Wang, A Moshchuk, S Hanna… - USENIX security …, 2011 - usenix.org
Modern browsers and smartphone operating systems treat applications as mutually
untrusting, potentially malicious principals. Applications are (1) isolated except for explicit …

Making information flow explicit in HiStar

N Zeldovich, S Boyd-Wickizer, E Kohler… - Communications of the …, 2011 - dl.acm.org
HiStar is a new operating system designed to minimize the amount of code that must be
trusted. HiStar provides strict information flow control, which allows users to specify precise …

Information flow control for standard OS abstractions

M Krohn, A Yip, M Brodsky, N Cliffer… - ACM SIGOPS …, 2007 - dl.acm.org
Decentralized Information Flow Control (DIFC) is an approach to security that allows
application writers to control how data flows between the pieces of an application and the …

[PDF][PDF] Automating configuration troubleshooting with dynamic information flow analysis

M Attariyan, J Flinn - 9th USENIX Symposium on Operating Systems …, 2010 - usenix.org
Software misconfigurations are time-consuming and enormously frustrating to troubleshoot.
In this paper, we show that dynamic information flow analysis helps solve these problems by …