Effective memory protection using dynamic tainting

@inproceedings{Clause2007EffectiveMP,
  title={Effective memory protection using dynamic tainting},
  author={James A. Clause and Ioannis Doudalis and A. Orso and M. Prvulovic},
  booktitle={ASE '07},
  year={2007}
}
  • James A. Clause, Ioannis Doudalis, +1 author M. Prvulovic
  • Published in ASE '07 2007
  • Computer Science
  • Programs written in languages that provide direct access tomemory through pointers often contain memory-related faults, which may cause non-deterministic failures and even security vulnerabilities. [...] Key Method Taint marks are then suitably propagated while the program executes and are checked every time a memory address m is accessed through a pointer p; if the taint marks associated with mand p differ, the execution is stopped and the illegalaccess is reported.Expand Abstract
    60 Citations
    Effective and Efficient Memory Protection Using Dynamic Tainting
    • 21
    • PDF
    TMAC: Taint-Based Memory Protection via Access Control
    • 1
    Preventing Memory Error Exploits with WIT
    • 297
    • PDF
    Runtime Enforcement of Memory Safety for the C Programming Language
    • 1
    Dynamic tainting for deployed Java programs
    • D. Li
    • Computer Science
    • SPLASH/OOPSLA Companion
    • 2010
    • 4
    Practical memory safety for C
    • 1
    • PDF
    Semantics-Directed Prototyping of Hardware Runtime Monitors
    • W. Harrison, G. Allwein
    • Computer Science
    • 2018 International Symposium on Rapid System Prototyping (RSP)
    • 2018
    • 1
    • PDF
    Protecting the Stack with Metadata Policies and Tagged Hardware
    • 10
    • PDF