A survey on automated dynamic malware-analysis techniques and tools

M Egele, T Scholte, E Kirda, C Kruegel - ACM computing surveys (CSUR …, 2008 - dl.acm.org
Anti-virus vendors are confronted with a multitude of potentially malicious samples today.
Receiving thousands of new samples every day is not uncommon. The signatures that …

Hardware information flow tracking

W Hu, A Ardeshiricham, R Kastner - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …

Speculative taint tracking (stt) a comprehensive protection for speculatively accessed data

J Yu, M Yan, A Khyzha, A Morrison, J Torrellas… - Proceedings of the …, 2019 - dl.acm.org
Speculative execution attacks present an enormous security threat, capable of reading
arbitrary program data under malicious speculation, and later exfiltrating that data over …

libdft: Practical dynamic data flow tracking for commodity systems

VP Kemerlis, G Portokalidis, K Jee… - Proceedings of the 8th …, 2012 - dl.acm.org
Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they
propagate during program execution. DFT has been repeatedly implemented by a variety of …

Context-sensitive fencing: Securing speculative execution via microcode customization

M Taram, A Venkat, D Tullsen - Proceedings of the Twenty-Fourth …, 2019 - dl.acm.org
This paper describes context-sensitive fencing (CSF), a microcode-level defense against
multiple variants of Spectre. CSF leverages the ability to dynamically alter the decoding of …

Register transfer level information flow tracking for provably secure hardware design

A Ardeshiricham, W Hu, J Marxen… - Design, Automation & …, 2017 - ieeexplore.ieee.org
Information Flow Tracking (IFT) provides a formal methodology for modeling and reasoning
about security properties related to integrity, confidentiality, and logical side channel …

Complete information flow tracking from the gates up

M Tiwari, HMG Wassel, B Mazloom, S Mysore… - Proceedings of the 14th …, 2009 - dl.acm.org
For many mission-critical tasks, tight guarantees on the flow of information are desirable, for
example, when handling important cryptographic keys or sensitive financial data. We …

HDFI: Hardware-assisted data-flow isolation

C Song, H Moon, M Alam, I Yun, B Lee… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Memory corruption vulnerabilities are the root cause of many modern attacks. Existing
defense mechanisms are inadequate; in general, the software-based approaches are not …

[PDF][PDF] Timber-v: Tag-isolated memory bringing fine-grained enclaves to risc-v

S Weiser, M Werner, F Brasser… - … 2019-Network and …, 2019 - graz.elsevierpure.com
Embedded computing devices are used on a large scale in the emerging internet of things
(IoT). However, their wide deployment raises the incentive for attackers to target these …

Context: A generic approach for mitigating spectre

M Schwarz, M Lipp, CA Canella… - Network and …, 2020 - graz.elsevierpure.com
Out-of-order execution and speculative execution are among the biggest contributors to
performance and efficiency of modern processors. However, they are inconsiderate, leaking …