完整後設資料紀錄
DC 欄位語言
dc.contributor.authorLin, Ying-Daren_US
dc.contributor.authorWu, Fan-Chengen_US
dc.contributor.authorHuang, Tze-Yauen_US
dc.contributor.authorLai, Yuan-Chengen_US
dc.contributor.authorLin, Frank C.en_US
dc.date.accessioned2014-12-08T15:38:06Z-
dc.date.available2014-12-08T15:38:06Z-
dc.date.issued2010en_US
dc.identifier.isbn978-1-4244-6404-3en_US
dc.identifier.issn1550-3607en_US
dc.identifier.urihttp://hdl.handle.net/11536/26142-
dc.description.abstractTaint tracking is a novel technique to prevent buffer overflow. Previous studies on taint tracking ran a victim's program on an emulator to dynamically instrument the code for tracking the propagation of taint data in memory and checking whether malicious code is executed. However, the critical problem of this approach is its heavy performance overhead. This paper proposes a new taint-style system called Embedded TaintTracker to eliminate the overhead in the emulator and dynamic instrumentation by compressing a checking mechanism into the operating system (OS) kernel and moving the instrumentation from runtime to compilation time. Results show that the proposed system outperforms the previous work, TaintCheck, by at least 8 times on throughput degradation, and is about 17.5 times faster than TaintCheck when browsing 1KB web pages.en_US
dc.language.isoen_USen_US
dc.subjectSoftware securityen_US
dc.subjectbuffer overflowen_US
dc.subjecttaint trackingen_US
dc.titleEmbedded TaintTracker: Lightweight Tracking of Taint Data against Buffer Overflow Attacksen_US
dc.typeArticleen_US
dc.identifier.journal2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONSen_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000290335601050-
顯示於類別:會議論文