A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects
communication from being decoded by unauthorised parties, whereas covert channels aim …
communication from being decoded by unauthorised parties, whereas covert channels aim …
Hardware information flow tracking
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …
understand how information moves through a computing system. Hardware IFT techniques …
{FlowFence}: Practical data protection for emerging {IoT} application frameworks
Emerging IoT programming frameworks enable building apps that compute on sensitive
data produced by smart homes and wearables. However, these frameworks only support …
data produced by smart homes and wearables. However, these frameworks only support …
Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones
Today's smartphone operating systems frequently fail to provide users with visibility into how
third-party applications collect and share their private data. We address these shortcomings …
third-party applications collect and share their private data. We address these shortcomings …
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
Android phones often carry personal information, attracting malicious developers to embed
code in Android applications to steal sensitive data. With known techniques in the literature …
code in Android applications to steal sensitive data. With known techniques in the literature …
Dytan: a generic dynamic taint analysis framework
Dynamic taint analysis is gaining momentum. Techniques based on dynamic tainting have
been successfully used in the context of application security, and now their use is also being …
been successfully used in the context of application security, and now their use is also being …
libdft: Practical dynamic data flow tracking for commodity systems
Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they
propagate during program execution. DFT has been repeatedly implemented by a variety of …
propagate during program execution. DFT has been repeatedly implemented by a variety of …
Context-sensitive fencing: Securing speculative execution via microcode customization
This paper describes context-sensitive fencing (CSF), a microcode-level defense against
multiple variants of Spectre. CSF leverages the ability to dynamically alter the decoding of …
multiple variants of Spectre. CSF leverages the ability to dynamically alter the decoding of …
Register transfer level information flow tracking for provably secure hardware design
Information Flow Tracking (IFT) provides a formal methodology for modeling and reasoning
about security properties related to integrity, confidentiality, and logical side channel …
about security properties related to integrity, confidentiality, and logical side channel …
Lift: A low-overhead practical information flow tracking system for detecting security attacks
Computer security is severely threatened by software vulnerabilities. Prior work shows that
information flow tracking (also referred to as taint analysis) is a promising technique to detect …
information flow tracking (also referred to as taint analysis) is a promising technique to detect …