Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception (original) (raw)
Related papers
TaintEraser: protecting sensitive data leaks using application-level taint tracking
Taint Analysis of Security Code in the KLEE Symbolic Execution Engine
Lecture Notes in Computer Science, 2012
Missing the Point(er): On the Effectiveness of Code Pointer Integrity
2015 IEEE Symposium on Security and Privacy, 2015
Pointless tainting?: evaluating the practicalitydd of pointer tainting
2009
A compiler-based infrastructure for software-protection
Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security, 2008
Mitigation of Advanced Code Reuse Attacks
2021
Securing Software by Enforcing Dataflow Integrity
2006
Drndalo: Lightweight Control Flow Obfuscation Through Minimal Processor/Compiler Co-Design
ArXiv, 2019
ACM SIGOPS Operating …, 2010
Sandmark-A tool for software protection research
IEEE Security & Privacy, 2003
From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation
In Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS), 2014
Dynamic Taint Propagation for Java
21st Annual Computer Security Applications Conference (ACSAC'05)
2010
Multi-language Dynamic Taint Analysis in a Polyglot Virtual Machine
17th International Conference on Managed Programming Languages and Runtimes, 2020
Obfuscated instructions for software protection
2003
Data tainting and obfuscation: Improving plausibility of incorrect taint
2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM), 2015
A Buffer Overflow Based Algorithm to Conceal Software Watermarking Trigger Behavior
IEICE Transactions on Information and Systems, 2014
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed)
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2021
ValueGuard: Protection of native applications against data-only buffer overflows
Analyzing control flow integrity with LLVM-CFI
Proceedings of the 35th Annual Computer Security Applications Conference on - ACSAC '19, 2019
Software Protection Through Dynamic Code Mutation
Lecture Notes in Computer Science, 2006
Output-Sensitive Information Flow Analysis
Formal Techniques for Distributed Objects, Components, and Systems, 2019
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
Proceedings of the 15th USENIX Security …, 2006
Mitigating code-reuse attacks with control-flow locking
Proceedings of the 27th Annual Computer Security Applications Conference on - ACSAC '11, 2011
A Survey of Control-Flow Obfuscations
Anirban Majumdar, Clark Thomborson
Lecture Notes in Computer Science, 2006
Analysis of defenses against code reuse attacks on modern and new architectures
2015
A Methodology for Designing Countermeasures Against Current and Future Code Injection Attacks
2005
Runtime Protection via Dataflow Flattening
2009 Third International Conference on Emerging Security Information, Systems and Technologies, 2009
Automatically Hardening Web Applications Using Precise Tainting
Security and Privacy in …, 2005