Secure program execution via dynamic information flow tracking

  title={Secure program execution via dynamic information flow tracking},
  author={G. Edward Suh and Jae W. Lee and David Zhang and Srinivas Devadas},
We present a simple architectural mechanism called dynamic information flow tracking that can significantly improve the security of computing systems with negligible performance overhead. Dynamic information flow tracking protects programs against malicious software attacks by identifying spurious information flows from untrusted I/O and restricting the usage of the spurious information.Every security attack to take control of a program needs to transfer the program's control to malevolent code… CONTINUE READING
Highly Influential
This paper has highly influenced 66 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 784 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 537 extracted citations

Security Tagging for a Zero-Kernel Operating System

2013 46th Hawaii International Conference on System Sciences • 2013
View 8 Excerpts
Highly Influenced

Mobilizing the Micro-Ops: Exploiting Context Sensitive Decoding for Security and Energy Efficiency

2018 ACM/IEEE 45th Annual International Symposium on Computer Architecture (ISCA) • 2018
View 10 Excerpts
Highly Influenced

PAGURUS: Low-Overhead Dynamic Information Flow Tracking on Loosely Coupled Accelerators

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems • 2018
View 6 Excerpts
Highly Influenced

INSPECTOR: Data Provenance Using Intel Processor Trace (PT)

2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS) • 2016
View 4 Excerpts
Highly Influenced

Compiler Construction

Bernhard Steffen, Gerhard Weikum, +3 authors Switzerland Moni Naor
Lecture Notes in Computer Science • 2013
View 11 Excerpts
Highly Influenced

WHISK: An uncore architecture for Dynamic Information Flow Tracking in heterogeneous embedded SoCs

2013 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS) • 2013
View 8 Excerpts
Highly Influenced

784 Citations

Citations per Year
Semantic Scholar estimates that this publication has 784 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-8 of 8 references

FormatGuard: Automatic Protection From printf Format String Vulnerabilities

USENIX Security Symposium • 2001
View 7 Excerpts
Highly Influenced

Mondrian memory protection

View 5 Excerpts
Highly Influenced

Transparent Run-Time Defense Against Stack-Smashing Attacks

USENIX Annual Technical Conference, General Track • 2000
View 7 Excerpts
Highly Influenced

Cyclone: A Safe Dialect of C

USENIX Annual Technical Conference, General Track • 2002
View 3 Excerpts
Highly Influenced

StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks

USENIX Security Symposium • 1998
View 3 Excerpts
Highly Influenced

The SimpleScalar tool set, version 2.0

SIGARCH Computer Architecture News • 1997
View 4 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…