Hardware information flow tracking

W Hu, A Ardeshiricham, R Kastner - ACM Computing Surveys (CSUR), 2021‏ - dl.acm.org
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …

libdft: Practical dynamic data flow tracking for commodity systems

VP Kemerlis, G Portokalidis, K Jee… - Proceedings of the 8th …, 2012‏ - dl.acm.org
Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they
propagate during program execution. DFT has been repeatedly implemented by a variety of …

DROP: Detecting return-oriented programming malicious code

P Chen, H **ao, X Shen, X Yin, B Mao, L **e - … Systems Security: 5th …, 2009‏ - Springer
Abstract Return-Oriented Programming (ROP) is a new technique that helps the attacker
construct malicious code mounted on x86/SPARC executables without any function call at …

DoublePlay: Parallelizing sequential logging and replay

K Veeraraghavan, D Lee, B Wester, J Ouyang… - ACM Transactions on …, 2012‏ - dl.acm.org
Deterministic replay systems record and reproduce the execution of a hardware or software
system. In contrast to replaying execution on uniprocessors, deterministic replay on …

Decoupling dynamic program analysis from execution in virtual environments

J Chow, T Garfinkel, PM Chen - 2008 USENIX Annual Technical …, 2008‏ - usenix.org
Analyzing the behavior of running programs has a wide variety of compelling applications,
from intrusion detection and prevention to bug discovery. Unfortunately, the high runtime …

Respec: efficient online multiprocessor replayvia speculation and external determinism

D Lee, B Wester, K Veeraraghavan… - ACM Sigplan …, 2010‏ - dl.acm.org
Deterministic replay systems record and reproduce the execution of a hardware or software
system. While it is well known how to replay uniprocessor systems, replaying shared …

Eidetic systems

D Devecsery, M Chow, X Dou, J Flinn… - 11th USENIX Symposium …, 2014‏ - usenix.org
The vast majority of state produced by a typical computer is generated, consumed, then lost
forever. We argue that a computer system should instead provide the ability to recall any …

{TaintPipe}: Pipelined symbolic taint analysis

J Ming, D Wu, G **ao, J Wang, P Liu - 24th USENIX Security Symposium …, 2015‏ - usenix.org
Taint analysis has a wide variety of compelling applications in security tasks, from software
attack detection to data lifetime analysis. Static taint analysis propagates taint values …

Operating system transactions

DE Porter, OS Hofmann, CJ Rossbach, A Benn… - Proceedings of the …, 2009‏ - dl.acm.org
Applications must be able to synchronize accesses to operating system resources in order to
ensure correctness in the face of concurrency and system failures. System transactions …

[HTML][HTML] Dynamic information flow tracking: Taxonomy, challenges, and opportunities

K Chen, X Guo, Q Deng, Y ** - Micromachines, 2021‏ - mdpi.com
Dynamic information flow tracking (DIFT) has been proven an effective technique to track
data usage; prevent control data attacks and non-control data attacks at runtime; and …