Taint checking

Known as: Taint, Taint check 
Taint checking is a feature in some computer programming languages, such as Perl and Ruby, designed to increase security by preventing malicious… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Today's smartphones are a ubiquitous source of private and confidential data. At the same time, smartphone users are plagued by… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Dynamic taint analysis is a powerful technique to detect memory corruption attacks. However, with typical overheads of an order… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • table 1
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analyses. Example… (More)
  • table I
  • figure 2
  • figure 1
  • figure 3
  • table II
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We present a new automated white box fuzzing technique and a tool, BuzzFuzz, that implements this technique. Unlike standard… (More)
  • figure 3
  • table 1
  • table 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Dynamic taint analysis is gaining momentum. Techniques based on dynamic tainting have been successfully used in the context of… (More)
  • figure 3
  • figure 4
  • figure 5
  • table 1
  • figure 7
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a well-known… (More)
  • figure 1
  • table 1
  • figure 2-5
  • figure 2-4
  • figure 2
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Most web applications contain security vulnerabilities. The simple and natural ways of creating a web application are prone to… (More)
  • figure 1
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Improperly validated user input is the underlying root cause for a wide variety of attacks on Web-based applications. Static… (More)
  • figure 1
  • figure 2
Is this relevant?