On the Limits of Information Flow Techniques for Malware Analysis and Containment

@inproceedings{Cavallaro2008OnTL,
  title={On the Limits of Information Flow Techniques for Malware Analysis and Containment},
  author={Lorenzo Cavallaro and Prateek Saxena and R. Sekar},
  booktitle={DIMVA},
  year={2008}
}
Taint-tracking is emerging as a general technique in software security to complement virtualization and static analysis. It has been applied for accurate detection of a wide range of attacks on benign software, as well as in malware defense. Although it is quite robust for tackling the former problem, application of taint analysis to untrusted (and potentially malicious) software is riddled with several difficulties that lead to gaping holes in defense. These holes arise not only due to the… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 108 CITATIONS

Optimised Malware Detection in Digital Forensics

VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Analyzing Covert Channels on Mobile Devices Master Thesis

VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Using Commodity Coprocessors for Host Intrusion Detection

VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2008
2019

CITATION STATISTICS

  • 7 Highly Influenced Citations

  • Averaged 6 Citations per year from 2017 through 2019

References

Publications referenced by this paper.
SHOWING 1-10 OF 41 REFERENCES

Dynamic spyware anal ysis

M. Egele, C. Kruegel, E. Kirda, H. Yin, D. Song
  • InUsenix Tech Conference ,
  • 2007
VIEW 10 EXCERPTS
HIGHLY INFLUENTIAL

Exploring Multiple Execution Paths for Malware Analysis

  • 2007 IEEE Symposium on Security and Privacy (SP '07)
  • 2007
VIEW 8 EXCERPTS
HIGHLY INFLUENTIAL

A practical technique for integrity protect ion from untrusted plug-ins

P. Saxena, R. Sekar, V. Puranik
  • Technical Report SECLAB08-01, Stony Brook University,
  • 2008
VIEW 2 EXCERPTS