• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 7,990
Next 10 →

Dynamic Information Flow Tracking on Multicores

by Vijay Nagarajan, Ho-Seop Kim, Youfeng Wu, Rajiv Gupta , 2008
"... Dynamic Information Flow Tracking (DIFT) is a promising technique for detecting software attacks. Due to the computationally intensive nature of the technique, prior efficient implementations [21, 6] rely on specialized hardware support whose only purpose is to enable DIFT. Alternatively, prior soft ..."
Abstract - Cited by 10 (2 self) - Add to MetaCart
Dynamic Information Flow Tracking (DIFT) is a promising technique for detecting software attacks. Due to the computationally intensive nature of the technique, prior efficient implementations [21, 6] rely on specialized hardware support whose only purpose is to enable DIFT. Alternatively, prior

Parallelizing Dynamic Information Flow Tracking

by Olatunji Ruwase, Phillip B. Gibbons, Todd C. Mowry, Vijaya Ramach, Shimin Chen, Michael Kozuch, Michael Ryan
"... Dynamic information flow tracking (DIFT) is an important tool for detecting common security attacks and memory bugs. A DIFT tool tracks the flow of information through a monitored program’s registers and memory locations as the program executes, detecting and containing/fixing problems on-the-fly. U ..."
Abstract - Cited by 28 (10 self) - Add to MetaCart
Dynamic information flow tracking (DIFT) is an important tool for detecting common security attacks and memory bugs. A DIFT tool tracks the flow of information through a monitored program’s registers and memory locations as the program executes, detecting and containing/fixing problems on

Secure Program Execution via Dynamic Information Flow Tracking

by G. Edward Suh, Jaewook Lee, Srinivas Devadas , 2004
"... Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of spurious information. Every security attack to take control of a program needs to transfer the program’s control to malevolen ..."
Abstract - Cited by 271 (3 self) - Add to MetaCart
Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of spurious information. Every security attack to take control of a program needs to transfer the program’s control

Scalable Dynamic Information Flow Tracking and its Applications

by Rajiv Gupta, Neelam Gupta, Xiangyu Zhang, Dennis Jeffrey, Vijay Nagarajan, Sriraman Tallam, Chen Tian
"... We are designing scalable dynamic information flow tracking techniques and employing them to carry out tasks related to debugging (bug location and fault avoidance), security (software attack detection), and data validation (lineage tracing of scientific data). The focus of our ongoing work is on de ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
We are designing scalable dynamic information flow tracking techniques and employing them to carry out tasks related to debugging (bug location and fault avoidance), security (software attack detection), and data validation (lineage tracing of scientific data). The focus of our ongoing work

Architecture-Independent Dynamic Information Flow Tracking?

by Ryan Whelan, Tim Leek, David Kaeli
"... Abstract. Dynamic information flow tracking is a well-known dynamic software analysis technique with a wide variety of applications that range from making systems more secure, to helping developers and analysts better understand the code that systems are executing. Traditionally, the fine-grained an ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
Abstract. Dynamic information flow tracking is a well-known dynamic software analysis technique with a wide variety of applications that range from making systems more secure, to helping developers and analysts better understand the code that systems are executing. Traditionally, the fine

Boosting the permissiveness of dynamic information-flow tracking by testing

by Arnar Birgisson, Daniel Hedin, Andrei Sabelfeld , 2012
"... Tracking information flow in dynamic languages remains an open challenge. It might seem natural to address the challenge by runtime monitoring. However, there are well-known fundamental limits of dynamic flow-sensitive tracking of information flow, where paths not taken in a given execution contrib ..."
Abstract - Cited by 15 (4 self) - Add to MetaCart
Tracking information flow in dynamic languages remains an open challenge. It might seem natural to address the challenge by runtime monitoring. However, there are well-known fundamental limits of dynamic flow-sensitive tracking of information flow, where paths not taken in a given execution

ABSTRACT Secure Program Execution via Dynamic Information Flow Tracking

by G. Edward Suh, Jae W. Lee, David Zhang, Srinivas Devadas
"... We present a simple architectural mechanism called dynamic information flow tracking that can significantly improve the security of computing systems with negligible performance overhead. Dynamic information flow tracking protects programs against malicious software attacks by identifying spurious i ..."
Abstract - Add to MetaCart
We present a simple architectural mechanism called dynamic information flow tracking that can significantly improve the security of computing systems with negligible performance overhead. Dynamic information flow tracking protects programs against malicious software attacks by identifying spurious

Integration of Static Instruction Analysis with Dynamic Information Flow Tracking

by Ivan Beschastnikh, Ian Post, Joshua Schwartz, Benedict Singer , 2006
"... Computer security is a constant issue for computer systems; thus, many schemes have been proposed to stop specific attacks. In this paper, we present a software implementation of the Dynamic Information Flow Tracking (DIFT) system which is designed to stop a broad range of control flow attacks [9]. ..."
Abstract - Add to MetaCart
Computer security is a constant issue for computer systems; thus, many schemes have been proposed to stop specific attacks. In this paper, we present a software implementation of the Dynamic Information Flow Tracking (DIFT) system which is designed to stop a broad range of control flow attacks [9

Decoupling dynamic information flow tracking with a dedicated coprocessor

by Hari Kannan, Michael Dalton, Christos Kozyrakis - In International Conference on Dependable Systems and Networks , 2009
"... Dynamic Information Flow Tracking (DIFT) is a promising security technique. With hardware support, DIFT prevents a wide range of attacks on vulnerable software with minimal performance impact. DIFT architectures, however, require significant changes in the processor pipeline that increase design and ..."
Abstract - Cited by 17 (4 self) - Add to MetaCart
Dynamic Information Flow Tracking (DIFT) is a promising security technique. With hardware support, DIFT prevents a wide range of attacks on vulnerable software with minimal performance impact. DIFT architectures, however, require significant changes in the processor pipeline that increase design

A General Dynamic Information Flow Tracking Framework for Security Applications

by unknown authors
"... Many software security solutions require accurate tracking of control/data dependencies among information objects in network applications. This paper presents a general dynamic information flow tracking framework (called GIFT) for C programs that allows an application developer to associate applicat ..."
Abstract - Add to MetaCart
Many software security solutions require accurate tracking of control/data dependencies among information objects in network applications. This paper presents a general dynamic information flow tracking framework (called GIFT) for C programs that allows an application developer to associate
Next 10 →
Results 1 - 10 of 7,990
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University