PolyTracker: Whole-Input Dynamic Information Flow Tracing
Abstract
References
Index Terms
- PolyTracker: Whole-Input Dynamic Information Flow Tracing
Recommendations
A dynamic marking method for implicit information flow in dynamic taint analysis
SIN '15: Proceedings of the 8th International Conference on Security of Information and NetworksDynamic taint analysis is an important technique for tracking information flow in software and it has been widely applied in the field of software testing, debugging and vulnerability detection. However, most of the dynamic taint analysis tools only ...
HardTaint: Production-Run Dynamic Taint Analysis via Selective Hardware Tracing
Dynamic taint analysis (DTA), as a fundamental analysis technique, is widely used in security, privacy, and diagnosis, etc. As DTA demands to collect and analyze massive taint data online, it suffers extremely high runtime overhead. Over the past decades,...
Polyglot, Label-Defined Dynamic Taint Analysis in TruffleTaint
MPLR '22: Proceedings of the 19th International Conference on Managed Programming Languages and RuntimesDynamic taint analysis assigns taint labels to sensitive data and tracks the propagation of such tainted data during program execution. This program analysis technique has been implemented in various analysis platforms targeting specific programming ...
Comments
Information & Contributors
Information
Published In

Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- Defense Advanced Research Projects Agency
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsoft
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 145Total Downloads
- Downloads (Last 12 months)145
- Downloads (Last 6 weeks)10
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in