Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Survey of dynamic taint analysis

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Junhyoung-
dc.contributor.authorKim, Taeguen-
dc.contributor.authorIm, Eul Gyu-
dc.date.accessioned2022-07-16T03:30:59Z-
dc.date.available2022-07-16T03:30:59Z-
dc.date.created2021-05-11-
dc.date.issued2014-09-
dc.identifier.issn0000-0000-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/159283-
dc.description.abstractDynamic taint analysis (DTA) is to analyze execution paths that an attacker may use to exploit a system. Dynamic taint analysis is a method to analyze executable files by tracing information flow without source code. DTA marks certain inputs to program as tainted, and then propagates values operated with tainted inputs. Due to the increased popularity of dynamic taint analysis, there have been a few recent research approaches to provide a generalized tainting infrastructure. In this paper, we introduce some approaches of dynamic taint analysis, and analyze their approaches. Lam and Chiueh's approach proposed a method that instruments code to perform taint marking and propagation. DYTAN considers three dimensions: taint source, propagation policies, taint sink. These dimensions make DYTAN to be more general framework for dynamic taint analysis. DTA++ proposes an idea to vanilla dynamic taint analysis that propagates additional taints along with targeted control dependencies. Control dependency causes results of taint analysis to have decreased accuracies. To improve accuracies, DTA++ showed that data transformation containing implicit flows should propagate properly to avoid under-tainting. ? 2014 IEEE.-
dc.language영어-
dc.language.isoen-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.titleSurvey of dynamic taint analysis-
dc.typeArticle-
dc.contributor.affiliatedAuthorIm, Eul Gyu-
dc.identifier.doi10.1109/ICNIDC.2014.7000307-
dc.identifier.scopusid2-s2.0-84929411784-
dc.identifier.bibliographicCitationProceedings of 2014 4th IEEE International Conference on Network Infrastructure and Digital Content, IEEE IC-NIDC 2014, pp.269 - 272-
dc.relation.isPartOfProceedings of 2014 4th IEEE International Conference on Network Infrastructure and Digital Content, IEEE IC-NIDC 2014-
dc.citation.titleProceedings of 2014 4th IEEE International Conference on Network Infrastructure and Digital Content, IEEE IC-NIDC 2014-
dc.citation.startPage269-
dc.citation.endPage272-
dc.type.rimsART-
dc.type.docTypeConference Paper-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordPlusData transformation-
dc.subject.keywordPlusDynamic Taint Analysis-
dc.subject.keywordPlusExecutable files-
dc.subject.keywordPlusExecution paths-
dc.subject.keywordPlusInformation flows-
dc.subject.keywordPlusPropagation policies-
dc.subject.keywordPlusRecent researches-
dc.subject.keywordPlusThree dimensions-
dc.subject.keywordPlusMetadata-
dc.subject.keywordAuthordynamic taint analysis-
dc.identifier.urlhttps://ieeexplore.ieee.org/document/7000307-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Im, Eul Gyu photo

Im, Eul Gyu
COLLEGE OF ENGINEERING (SCHOOL OF COMPUTER SCIENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE