Hardware information flow tracking
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …
understand how information moves through a computing system. Hardware IFT techniques …
{FlowFence}: Practical data protection for emerging {IoT} application frameworks
Emerging IoT programming frameworks enable building apps that compute on sensitive
data produced by smart homes and wearables. However, these frameworks only support …
data produced by smart homes and wearables. However, these frameworks only support …
Chex: statically vetting android apps for component hijacking vulnerabilities
An enormous number of apps have been developed for Android in recent years, making it
one of the most popular mobile operating systems. However, the quality of the booming …
one of the most popular mobile operating systems. However, the quality of the booming …
Analyzing inter-application communication in Android
Modern smartphone operating systems support the development of third-party applications
with open system APIs. In addition to an open API, the Android operating system also …
with open system APIs. In addition to an open API, the Android operating system also …
{SLEUTH}: Real-time attack scenario reconstruction from {COTS} audit data
We present an approach and system for real-time reconstruction of attack scenarios on an
enterprise host. To meet the scalability and real-time needs of the problem, we develop a …
enterprise host. To meet the scalability and real-time needs of the problem, we develop a …
Protracer: Towards practical provenance tracing by alternating between logging and tainting
ProTracer: towards practical provenance tracing by alternating between logging and
tainting Page 1 Please do not remove this page ProTracer: towards practical provenance …
tainting Page 1 Please do not remove this page ProTracer: towards practical provenance …
[PDF][PDF] Permission re-delegation: Attacks and defenses.
Modern browsers and smartphone operating systems treat applications as mutually
untrusting, potentially malicious principals. Applications are (1) isolated except for explicit …
untrusting, potentially malicious principals. Applications are (1) isolated except for explicit …
Making information flow explicit in HiStar
HiStar is a new operating system designed to minimize the amount of code that must be
trusted. HiStar provides strict information flow control, which allows users to specify precise …
trusted. HiStar provides strict information flow control, which allows users to specify precise …
Information flow control for standard OS abstractions
M Krohn, A Yip, M Brodsky, N Cliffer… - ACM SIGOPS …, 2007 - dl.acm.org
Decentralized Information Flow Control (DIFC) is an approach to security that allows
application writers to control how data flows between the pieces of an application and the …
application writers to control how data flows between the pieces of an application and the …
[PDF][PDF] Automating configuration troubleshooting with dynamic information flow analysis
M Attariyan, J Flinn - 9th USENIX Symposium on Operating Systems …, 2010 - usenix.org
Software misconfigurations are time-consuming and enormously frustrating to troubleshoot.
In this paper, we show that dynamic information flow analysis helps solve these problems by …
In this paper, we show that dynamic information flow analysis helps solve these problems by …