Using Dynamic Data-Flow Analysis to Improve Software Security
@inproceedings{Lin2005UsingDD, title={Using Dynamic Data-Flow Analysis to Improve Software Security}, author={C. Lin}, year={2005} }
The security community has proposed various techniques, su ch as honeypots and inline reference monitors (IRM), for improving software security. Unfortunately, these techniqu es are typically difficult to implement, relying either on ex t nsive manual effort or tedious, error prone low-level programmin g. This project extends our previous work with the Broadway system to provide an effective way of building such security tools. Our solution uses Broadway’s existing annotation language to… CONTINUE READING
References
SHOWING 1-10 OF 10 REFERENCES
IRM enforcement of Java stack inspection
- Computer Science
- Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000
- 2000
- 350
- PDF
Honeypot forensics
- Engineering
- Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.
- 2004
- 26
Detection of Data Flow Anomaly Through Program Instrumentation
- Computer Science
- IEEE Transactions on Software Engineering
- 1979
- 89
- PDF
Guyer and Calvin Lin . Error checking with clientdriven pointer analysis
- 2005
Guyer and Calvin Lin . Clientdriven pointer analysis