Hardware information flow tracking
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …
understand how information moves through a computing system. Hardware IFT techniques …
libdft: Practical dynamic data flow tracking for commodity systems
Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they
propagate during program execution. DFT has been repeatedly implemented by a variety of …
propagate during program execution. DFT has been repeatedly implemented by a variety of …
DoublePlay: Parallelizing sequential logging and replay
Deterministic replay systems record and reproduce the execution of a hardware or software
system. In contrast to replaying execution on uniprocessors, deterministic replay on …
system. In contrast to replaying execution on uniprocessors, deterministic replay on …
Decoupling dynamic program analysis from execution in virtual environments
Analyzing the behavior of running programs has a wide variety of compelling applications,
from intrusion detection and prevention to bug discovery. Unfortunately, the high runtime …
from intrusion detection and prevention to bug discovery. Unfortunately, the high runtime …
Respec: efficient online multiprocessor replayvia speculation and external determinism
Deterministic replay systems record and reproduce the execution of a hardware or software
system. While it is well known how to replay uniprocessor systems, replaying shared …
system. While it is well known how to replay uniprocessor systems, replaying shared …
Eidetic systems
The vast majority of state produced by a typical computer is generated, consumed, then lost
forever. We argue that a computer system should instead provide the ability to recall any …
forever. We argue that a computer system should instead provide the ability to recall any …
Dynamic information flow tracking: Taxonomy, challenges, and opportunities
Dynamic information flow tracking (DIFT) has been proven an effective technique to track
data usage; prevent control data attacks and non-control data attacks at runtime; and …
data usage; prevent control data attacks and non-control data attacks at runtime; and …
{TaintPipe}: Pipelined symbolic taint analysis
Taint analysis has a wide variety of compelling applications in security tasks, from software
attack detection to data lifetime analysis. Static taint analysis propagates taint values …
attack detection to data lifetime analysis. Static taint analysis propagates taint values …
Mosaic: cross-platform user-interaction record and replay for the fragmented android ecosystem
In contrast to traditional computing systems, such as desktops and servers, that are
programmed to perform “compute-bound” and “run-to-completion” tasks, mobile applications …
programmed to perform “compute-bound” and “run-to-completion” tasks, mobile applications …
Operating system transactions
Applications must be able to synchronize accesses to operating system resources in order to
ensure correctness in the face of concurrency and system failures. System transactions …
ensure correctness in the face of concurrency and system failures. System transactions …