Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception (original) (raw)

TaintEraser: protecting sensitive data leaks using application-level taint tracking

Jaeyeon Jung

View PDFchevron_right

Taint Analysis of Security Code in the KLEE Symbolic Execution Engine

Felipe Andres Manzano

Lecture Notes in Computer Science, 2012

View PDFchevron_right

Missing the Point(er): On the Effectiveness of Code Pointer Integrity

Isaac Evans

2015 IEEE Symposium on Security and Privacy, 2015

View PDFchevron_right

Pointless tainting?: evaluating the practicalitydd of pointer tainting

keylog ger

2009

View PDFchevron_right

A compiler-based infrastructure for software-protection

Harold Johnson

Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security, 2008

View PDFchevron_right

Mitigation of Advanced Code Reuse Attacks

Dr. Paul Muntean

2021

View PDFchevron_right

Securing Software by Enforcing Dataflow Integrity

Manuel Costa

2006

View PDFchevron_right

Drndalo: Lightweight Control Flow Obfuscation Through Minimal Processor/Compiler Co-Design

Novak Boskov

ArXiv, 2019

View PDFchevron_right

Tainting is not pointless

Mike Dalton

ACM SIGOPS Operating …, 2010

View PDFchevron_right

Sandmark-A tool for software protection research

Andrew Huntwork

IEEE Security & Privacy, 2003

View PDFchevron_right

From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation

Frederico Araujo

In Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS), 2014

View PDFchevron_right

Dynamic Taint Propagation for Java

Vivek Haldar

21st Annual Computer Security Applications Conference (ACSAC'05)

View PDFchevron_right

All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)

Thanassis Avgerinos

2010

View PDFchevron_right

Multi-language Dynamic Taint Analysis in a Polyglot Virtual Machine

Hanspeter Mössenböck

17th International Conference on Managed Programming Languages and Runtimes, 2020

View PDFchevron_right

Obfuscated instructions for software protection

A. Monden, Clark Thomborson

2003

View PDFchevron_right

Data tainting and obfuscation: Improving plausibility of incorrect taint

Sandrine Blazy

2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM), 2015

View PDFchevron_right

A Buffer Overflow Based Algorithm to Conceal Software Watermarking Trigger Behavior

Catherine Vairappan

IEICE Transactions on Information and Systems, 2014

View PDFchevron_right

SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed)

Emilio Coppa

Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

View PDFchevron_right

Track Conventions, Not Attack Signatures: Fortifying X86 ABI and System Call Interfaces to Mitigate Code Reuse Attacks

Sarp Özdemir

2021

View PDFchevron_right

ValueGuard: Protection of native applications against data-only buffer overflows

Nick Nikiforakis

View PDFchevron_right

Analyzing control flow integrity with LLVM-CFI

Dr. Paul Muntean

Proceedings of the 35th Annual Computer Security Applications Conference on - ACSAC '19, 2019

View PDFchevron_right

Software Protection Through Dynamic Code Mutation

Koen Bosschere

Lecture Notes in Computer Science, 2006

View PDFchevron_right

Output-Sensitive Information Flow Analysis

Cristian Ene

Formal Techniques for Distributed Objects, Components, and Systems, 2019

View PDFchevron_right

Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks

Mohammed Hamada

Proceedings of the 15th USENIX Security …, 2006

View PDFchevron_right

Mitigating code-reuse attacks with control-flow locking

Vincent Freeh

Proceedings of the 27th Annual Computer Security Applications Conference on - ACSAC '11, 2011

View PDFchevron_right

A Survey of Control-Flow Obfuscations

Anirban Majumdar, Clark Thomborson

Lecture Notes in Computer Science, 2006

View PDFchevron_right

Analysis of defenses against code reuse attacks on modern and new architectures

Isaac Evans

2015

View PDFchevron_right

A Methodology for Designing Countermeasures Against Current and Future Code Injection Attacks

Yves Younan

2005

View PDFchevron_right

Runtime Protection via Dataflow Flattening

Chit Saw, Mariusz Jakubowski

2009 Third International Conference on Emerging Security Information, Systems and Technologies, 2009

View PDFchevron_right

Automatically Hardening Web Applications Using Precise Tainting

Mohammed Hamada

Security and Privacy in …, 2005

View PDFchevron_right