TASEL: Dynamic Taint Analysis with selective control dependency
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kang, Byeongho | - |
dc.contributor.author | Kim, Taeguen | - |
dc.contributor.author | Kang, BooJoong | - |
dc.contributor.author | Im, Eul Gyu | - |
dc.contributor.author | Ryu, Minsoo | - |
dc.date.accessioned | 2022-07-16T02:38:20Z | - |
dc.date.available | 2022-07-16T02:38:20Z | - |
dc.date.created | 2021-05-13 | - |
dc.date.issued | 2014-10 | - |
dc.identifier.issn | 0000-0000 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/158944 | - |
dc.description.abstract | Dynamic Taint Analysis (DTA) is an approach used for software testing and vulnerability analysis. The vanilla DTA method is widely used, but its simple taint propagation does not consider any control dependency. Therefore, vanilla DTA generally suffers from the under-tainting caused by control dependency. The under-tainting can be problematic when analyzers try to check vulnerabilities of software. In this paper, we propose Dynamic Taint Analysis with Selective Control Dependency (TASEL), to mitigate the under-tainting problem caused by control dependency. Our technique detects control-dependent data which have possibilities to change the program's control flows. We implemented TASEL using Intel Pin, and applied it for the commodity programs such as Microsoft Notepad. Experimental results show our proposed method successfully resolves the under-tainting problem, without causing the over-tainting problem. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Association for Computing Machinery, Inc | - |
dc.title | TASEL: Dynamic Taint Analysis with selective control dependency | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Im, Eul Gyu | - |
dc.contributor.affiliatedAuthor | Ryu, Minsoo | - |
dc.identifier.doi | 10.1145/2663761.2664219 | - |
dc.identifier.scopusid | 2-s2.0-84909999001 | - |
dc.identifier.bibliographicCitation | Proceedings of the 2014 Research in Adaptive and Convergent Systems, RACS 2014, pp.272 - 277 | - |
dc.relation.isPartOf | Proceedings of the 2014 Research in Adaptive and Convergent Systems, RACS 2014 | - |
dc.citation.title | Proceedings of the 2014 Research in Adaptive and Convergent Systems, RACS 2014 | - |
dc.citation.startPage | 272 | - |
dc.citation.endPage | 277 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Binary files | - |
dc.subject.keywordPlus | Control flows | - |
dc.subject.keywordPlus | DTA methods | - |
dc.subject.keywordPlus | Dynamic Taint Analysis | - |
dc.subject.keywordPlus | Selective control | - |
dc.subject.keywordPlus | Software analysis | - |
dc.subject.keywordPlus | Taint propagation | - |
dc.subject.keywordPlus | Vulnerability analysis | - |
dc.subject.keywordPlus | Software testing | - |
dc.subject.keywordAuthor | Binary file analysis | - |
dc.subject.keywordAuthor | Control dependency | - |
dc.subject.keywordAuthor | Dynamic Taint Analysis | - |
dc.subject.keywordAuthor | Software analysis | - |
dc.subject.keywordAuthor | Vulnerability analysis | - |
dc.identifier.url | https://dl.acm.org/doi/10.1145/2663761.2664219 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.