Effective memory protection using dynamic tainting

  title={Effective memory protection using dynamic tainting},
  author={J. Clause and Ioannis Doudalis and A. Orso and M. Prvulovic},
  booktitle={ASE '07},
Programs written in languages that provide direct access tomemory through pointers often contain memory-related faults, which may cause non-deterministic failures and even security vulnerabilities. [...] Key Method Taint marks are then suitably propagated while the program executes and are checked every time a memory address m is accessed through a pointer p; if the taint marks associated with mand p differ, the execution is stopped and the illegalaccess is reported.Expand
60 Citations
Effective and Efficient Memory Protection Using Dynamic Tainting
  • 21
  • PDF
TMAC: Taint-Based Memory Protection via Access Control
  • 1
Preventing Memory Error Exploits with WIT
  • 297
  • PDF
Runtime Enforcement of Memory Safety for the C Programming Language
  • 1
Dynamic tainting for deployed Java programs
  • D. Li
  • Computer Science
  • SPLASH/OOPSLA Companion
  • 2010
  • 4
Practical memory safety for C
  • 1
  • PDF
Semantics-Directed Prototyping of Hardware Runtime Monitors
  • W. Harrison, G. Allwein
  • Computer Science
  • 2018 International Symposium on Rapid System Prototyping (RSP)
  • 2018
  • 1
  • PDF
Protecting the Stack with Metadata Policies and Tagged Hardware
  • 11
  • PDF