Bit-Level Taint Analysis

@article{Yadegari2014BitLevelTA,
  title={Bit-Level Taint Analysis},
  author={Babak Yadegari and Saumya Debray},
  journal={2014 IEEE 14th International Working Conference on Source Code Analysis and Manipulation},
  year={2014},
  pages={255-264}
}
Taint analysis has a wide variety of applications in software analysis, making the precision of taint analysis an important consideration. Current taint analysis algorithms, including previous work on bit-precise taint analyses, suffer from shortcomings that can lead to significant loss of precision (under/over tainting) in some situations. This paper discusses these limitations of existing taint analysis algorithms, shows how they can lead to imprecise taint propagation, and proposes a… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 20 CITATIONS

ENVIRONMENTAL MONITORING DETECTOR

VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

ATOS: Adaptive Program Tracing With Online Control Flow Graph Support

He Sun, Chao Zhang, +3 authors Yun Li
  • IEEE Access
  • 2019
VIEW 1 EXCERPT
CITES METHODS

Probabilistic Obfuscation Through Covert Channels

  • 2018 IEEE European Symposium on Security and Privacy (EuroS&P)
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 22 REFERENCES

Large-scale malware indexing using function-call graphs

  • ACM Conference on Computer and Communications Security
  • 2009
VIEW 1 EXCERPT

Ether: malware analysis via hardware virtualization extensions

  • ACM Conference on Computer and Communications Security
  • 2008
VIEW 1 EXCERPT