Hardware information flow tracking

W Hu, A Ardeshiricham, R Kastner - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …

libdft: Practical dynamic data flow tracking for commodity systems

VP Kemerlis, G Portokalidis, K Jee… - Proceedings of the 8th …, 2012 - dl.acm.org
Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they
propagate during program execution. DFT has been repeatedly implemented by a variety of …

DoublePlay: Parallelizing sequential logging and replay

K Veeraraghavan, D Lee, B Wester, J Ouyang… - ACM Transactions on …, 2012 - dl.acm.org
Deterministic replay systems record and reproduce the execution of a hardware or software
system. In contrast to replaying execution on uniprocessors, deterministic replay on …

Decoupling dynamic program analysis from execution in virtual environments

J Chow, T Garfinkel, PM Chen - 2008 USENIX Annual Technical …, 2008 - usenix.org
Analyzing the behavior of running programs has a wide variety of compelling applications,
from intrusion detection and prevention to bug discovery. Unfortunately, the high runtime …

Respec: efficient online multiprocessor replayvia speculation and external determinism

D Lee, B Wester, K Veeraraghavan… - ACM Sigplan …, 2010 - dl.acm.org
Deterministic replay systems record and reproduce the execution of a hardware or software
system. While it is well known how to replay uniprocessor systems, replaying shared …

Eidetic systems

D Devecsery, M Chow, X Dou, J Flinn… - 11th USENIX Symposium …, 2014 - usenix.org
The vast majority of state produced by a typical computer is generated, consumed, then lost
forever. We argue that a computer system should instead provide the ability to recall any …

Dynamic information flow tracking: Taxonomy, challenges, and opportunities

K Chen, X Guo, Q Deng, Y ** - Micromachines, 2021 - mdpi.com
Dynamic information flow tracking (DIFT) has been proven an effective technique to track
data usage; prevent control data attacks and non-control data attacks at runtime; and …

{TaintPipe}: Pipelined symbolic taint analysis

J Ming, D Wu, G **ao, J Wang, P Liu - 24th USENIX Security Symposium …, 2015 - usenix.org
Taint analysis has a wide variety of compelling applications in security tasks, from software
attack detection to data lifetime analysis. Static taint analysis propagates taint values …

Mosaic: cross-platform user-interaction record and replay for the fragmented android ecosystem

M Halpern, Y Zhu, R Peri… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
In contrast to traditional computing systems, such as desktops and servers, that are
programmed to perform “compute-bound” and “run-to-completion” tasks, mobile applications …

Operating system transactions

DE Porter, OS Hofmann, CJ Rossbach, A Benn… - Proceedings of the …, 2009 - dl.acm.org
Applications must be able to synchronize accesses to operating system resources in order to
ensure correctness in the face of concurrency and system failures. System transactions …