The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for tainting with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2005-2010 (20) 2012-2022 (15) 2023 (1)
Publication types (Num. hits)
article(8) inproceedings(28)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 30 occurrences of 24 keywords

Results
Found 36 publication records. Showing 36 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
260Asia Slowinska, Herbert Bos Pointless tainting?: evaluating the practicality of pointer tainting. Search on Bibsonomy EuroSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dynamic taint analysis, pointer tainting
225James A. Clause, Wanchun Li, Alessandro Orso Dytan: a generic dynamic taint analysis framework. Search on Bibsonomy ISSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF information flow, general framework, dynamic tainting
77James A. Clause, Alessandro Orso Penumbra: automatically identifying failure-relevant inputs using dynamic tainting. Search on Bibsonomy ISSTA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dynamic information flow, failure-relevant inputs, automated debugging, dynamic tainting
77James A. Clause, Ioannis Doudalis, Alessandro Orso, Milos Prvulovic Effective memory protection using dynamic tainting. Search on Bibsonomy ASE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF illegal memory accesses, hardware support, dynamic tainting
77William G. J. Halfond, Alessandro Orso, Panagiotis Manolios Using positive tainting and syntax-aware evaluation to counter SQL injection attacks. Search on Bibsonomy SIGSOFT FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF runtime monitoring, SQL injection, dynamic tainting
73Alex Ho, Michael A. Fetterman, Christopher Clark, Andrew Warfield, Steven Hand 0001 Practical taint-based protection using demand emulation. Search on Bibsonomy EuroSys The full citation details ... 2006 DBLP  DOI  BibTeX  RDF QEMU, demand emulation, false tainting, tainting, virtual machine, virtualization, emulation, Xen
58Asia Slowinska, Herbert Bos Pointer tainting still pointless: (but we all see the point of tainting). Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
51William G. J. Halfond, Alessandro Orso, Pete Manolios WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security and Protection, Protection mechanisms
44James Newsome, Stephen McCamant, Dawn Song Measuring channel capacity to distinguish undue influence. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF model counting, quantitative information flow, channel capacity
29Shi Meng, Liu Wang, Shenao Wang, Kailong Wang, Xusheng Xiao, Guangdong Bai, Haoyu Wang 0001 Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs. Search on Bibsonomy ASE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
29Shaun Azzopardi, Joshua Ellul, Ryan Falzon, Gordon J. Pace Tainting in Smart Contracts: Combining Static and Runtime Verification. Search on Bibsonomy RV The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
29Toshinori Usui, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Kanta Matsuura Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks. Search on Bibsonomy RAID The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
29Lannan Luo, Qiang Zeng 0001, Chen Cao, Kai Chen 0012, Jian Liu 0008, Limin Liu, Neng Gao, Min Yang 0002, Xinyu Xing, Peng Liu 0005 Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
29Yi Liu, Lejian Liao, Tian Song Static tainting extraction approach based on information flow graph for personally identifiable information. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
29Maysam Zoor, Ludovic Apvrille, Renaud Pacalet SysML models: studying safety and security measures impact on performance using graph tainting. Search on Bibsonomy MoDELS (Companion) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
29Tin Tironsakkul, Manuel Maarek, Andrea Eross, Mike Just Probing the Mystery of Cryptocurrency Theft: An Investigation into Methods for Cryptocurrency Tainting Analysis. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
29Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet, Routa Moussaileb Detection of Side Channel Attacks Based on Data Tainting in Android Systems. Search on Bibsonomy SEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
29Björn Mathis Dynamic tainting for automatic test case generation. Search on Bibsonomy ISSTA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
29Martin Ussath, Feng Cheng 0002, Christoph Meinel Event attribute tainting: A new approach for attack tracing and event correlation. Search on Bibsonomy NOMS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29Shiqing Ma, Xiangyu Zhang 0001, Dongyan Xu ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
29Chi-Wei Wang, Shiuhpyng Winston Shieh DROIT: Dynamic Alternation of Dual-Level Tainting for Malware Analysis. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2015 DBLP  BibTeX  RDF
29Sandrine Blazy, Stéphanie Riaud, Thomas Sirvent Data tainting and obfuscation: Improving plausibility of incorrect taint. Search on Bibsonomy SCAM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
29Peter Mell, Richard E. Harang Using Network Tainting to Bound the Scope of Network Ingress Attacks. Search on Bibsonomy SERE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
29Ioannis Doudalis, James A. Clause, Guru Venkataramani, Milos Prvulovic, Alessandro Orso Effective and Efficient Memory Protection Using Dynamic Tainting. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
29Seong Oun Hwang Finding Vulnerabilities in Binary Codes Using Tainting/Fuzzing Analysis. Search on Bibsonomy ICHIT (2) The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
29Michael Dalton, Hari Kannan, Christos Kozyrakis Tainting is not pointless. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
29Du Li Dynamic tainting for deployed Java programs. Search on Bibsonomy SPLASH/OOPSLA Companion The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
29Dejan Baca Identifying Security Relevant Warnings from Static Code Analysis Tools through Code Tainting. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF dua, security, data flow, coverity, Static code analysis, taint analysis, findbugs
29Pankaj Dhoolia, Senthil Mani, Vibha Singhal Sinha, Saurabh Sinha Debugging Model-Transformation Failures Using Dynamic Tainting. Search on Bibsonomy ECOOP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
29Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Krügel, Giovanni Vigna Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. Search on Bibsonomy NDSS The full citation details ... 2007 DBLP  BibTeX  RDF
29Anh Nguyen-Tuong, Salvatore Guarnieri, Doug Greene, Jeff Shirley, David Evans 0001 Automatically Hardening Web Applications Using Precise Tainting. Search on Bibsonomy SEC The full citation details ... 2005 DBLP  BibTeX  RDF
26James A. Clause, Alessandro Orso LEAKPOINT: pinpointing the causes of memory leaks. Search on Bibsonomy ICSE (1) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF leak detection, dynamic tainting
26Qing Zhang 0012, John McCullough, Justin Ma, Nabil Schear, Michael Vrable, Amin Vahdat, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage Neon: system support for derived data management. Search on Bibsonomy VEE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF difc, memory tainting, qemu, virtualization, xen
22Masakatsu Nishigaki, Takumi Yamamoto Making Use of Human Visual Capability to Improve Information Security. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Stephen McCamant, Michael D. Ernst Quantitative information flow as network flow capacity. Search on Bibsonomy PLDI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF implicit flow, dynamic analysis, information-flow analysis
22Ashish Gehani, John H. Reif Super-Resolution Video Analysis for Forensic Investigations. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Video recordings, super-resolution analysis, parameterization
Displaying result #1 - #36 of 36 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license