Effective memory protection using dynamic tainting
@inproceedings{Clause2007EffectiveMP, title={Effective memory protection using dynamic tainting}, author={James A. Clause and Ioannis Doudalis and A. Orso and M. Prvulovic}, booktitle={ASE '07}, year={2007} }
Programs written in languages that provide direct access tomemory through pointers often contain memory-related faults, which may cause non-deterministic failures and even security vulnerabilities. [...] Key Method Taint marks are then suitably propagated while the program executes and are checked every time a memory address m is accessed through a pointer p; if the taint marks associated with mand p differ, the execution is stopped and the illegalaccess is reported.Expand Abstract
60 Citations
Effective and Efficient Memory Protection Using Dynamic Tainting
- Computer Science
- IEEE Transactions on Computers
- 2012
- 21
- PDF
TMAC: Taint-Based Memory Protection via Access Control
- Computer Science
- 2009 Second International Conference on Dependability
- 2009
- 1
Preventing Memory Error Exploits with WIT
- Computer Science
- 2008 IEEE Symposium on Security and Privacy (sp 2008)
- 2008
- 297
- PDF
FreeSentry: protecting against use-after-free vulnerabilities due to dangling pointers
- Computer Science
- NDSS
- 2015
- 67
- PDF
Semantics-Directed Prototyping of Hardware Runtime Monitors
- Computer Science
- 2018 International Symposium on Rapid System Prototyping (RSP)
- 2018
- 1
- PDF
Protecting the Stack with Metadata Policies and Tagged Hardware
- Computer Science
- 2018 IEEE Symposium on Security and Privacy (SP)
- 2018
- 10
- PDF
PAriCheck: an efficient pointer arithmetic checker for C programs
- Computer Science
- ASIACCS '10
- 2010
- 77
- PDF