A survey of covert channels and countermeasures in computer network protocols

S Zander, G Armitage, P Branch - … Communications Surveys & …, 2007 - ieeexplore.ieee.org
Covert channels are used for the secret transfer of information. Encryption only protects
communication from being decoded by unauthorised parties, whereas covert channels aim …

Hardware information flow tracking

W Hu, A Ardeshiricham, R Kastner - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …

{FlowFence}: Practical data protection for emerging {IoT} application frameworks

E Fernandes, J Paupore, A Rahmati… - 25th USENIX security …, 2016 - usenix.org
Emerging IoT programming frameworks enable building apps that compute on sensitive
data produced by smart homes and wearables. However, these frameworks only support …

Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones

W Enck, P Gilbert, S Han, V Tendulkar… - ACM Transactions on …, 2014 - dl.acm.org
Today's smartphone operating systems frequently fail to provide users with visibility into how
third-party applications collect and share their private data. We address these shortcomings …

Appintent: Analyzing sensitive data transmission in android for privacy leakage detection

Z Yang, M Yang, Y Zhang, G Gu, P Ning… - Proceedings of the 2013 …, 2013 - dl.acm.org
Android phones often carry personal information, attracting malicious developers to embed
code in Android applications to steal sensitive data. With known techniques in the literature …

Dytan: a generic dynamic taint analysis framework

J Clause, W Li, A Orso - … of the 2007 international symposium on …, 2007 - dl.acm.org
Dynamic taint analysis is gaining momentum. Techniques based on dynamic tainting have
been successfully used in the context of application security, and now their use is also being …

libdft: Practical dynamic data flow tracking for commodity systems

VP Kemerlis, G Portokalidis, K Jee… - Proceedings of the 8th …, 2012 - dl.acm.org
Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they
propagate during program execution. DFT has been repeatedly implemented by a variety of …

Context-sensitive fencing: Securing speculative execution via microcode customization

M Taram, A Venkat, D Tullsen - Proceedings of the Twenty-Fourth …, 2019 - dl.acm.org
This paper describes context-sensitive fencing (CSF), a microcode-level defense against
multiple variants of Spectre. CSF leverages the ability to dynamically alter the decoding of …

Register transfer level information flow tracking for provably secure hardware design

A Ardeshiricham, W Hu, J Marxen… - Design, Automation & …, 2017 - ieeexplore.ieee.org
Information Flow Tracking (IFT) provides a formal methodology for modeling and reasoning
about security properties related to integrity, confidentiality, and logical side channel …

Lift: A low-overhead practical information flow tracking system for detecting security attacks

F Qin, C Wang, Z Li, H Kim, Y Zhou… - 2006 39th Annual IEEE …, 2006 - ieeexplore.ieee.org
Computer security is severely threatened by software vulnerabilities. Prior work shows that
information flow tracking (also referred to as taint analysis) is a promising technique to detect …