完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Lin, Ying-Dar | en_US |
dc.contributor.author | Wu, Fan-Cheng | en_US |
dc.contributor.author | Huang, Tze-Yau | en_US |
dc.contributor.author | Lai, Yuan-Cheng | en_US |
dc.contributor.author | Lin, Frank C. | en_US |
dc.date.accessioned | 2014-12-08T15:38:06Z | - |
dc.date.available | 2014-12-08T15:38:06Z | - |
dc.date.issued | 2010 | en_US |
dc.identifier.isbn | 978-1-4244-6404-3 | en_US |
dc.identifier.issn | 1550-3607 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/26142 | - |
dc.description.abstract | Taint tracking is a novel technique to prevent buffer overflow. Previous studies on taint tracking ran a victim's program on an emulator to dynamically instrument the code for tracking the propagation of taint data in memory and checking whether malicious code is executed. However, the critical problem of this approach is its heavy performance overhead. This paper proposes a new taint-style system called Embedded TaintTracker to eliminate the overhead in the emulator and dynamic instrumentation by compressing a checking mechanism into the operating system (OS) kernel and moving the instrumentation from runtime to compilation time. Results show that the proposed system outperforms the previous work, TaintCheck, by at least 8 times on throughput degradation, and is about 17.5 times faster than TaintCheck when browsing 1KB web pages. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Software security | en_US |
dc.subject | buffer overflow | en_US |
dc.subject | taint tracking | en_US |
dc.title | Embedded TaintTracker: Lightweight Tracking of Taint Data against Buffer Overflow Attacks | en_US |
dc.type | Article | en_US |
dc.identifier.journal | 2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000290335601050 | - |
顯示於類別: | 會議論文 |