|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 30 occurrences of 24 keywords
|
|
|
Results
Found 36 publication records. Showing 36 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
260 | Asia Slowinska, Herbert Bos |
Pointless tainting?: evaluating the practicality of pointer tainting. |
EuroSys |
2009 |
DBLP DOI BibTeX RDF |
dynamic taint analysis, pointer tainting |
225 | James A. Clause, Wanchun Li, Alessandro Orso |
Dytan: a generic dynamic taint analysis framework. |
ISSTA |
2007 |
DBLP DOI BibTeX RDF |
information flow, general framework, dynamic tainting |
77 | James A. Clause, Alessandro Orso |
Penumbra: automatically identifying failure-relevant inputs using dynamic tainting. |
ISSTA |
2009 |
DBLP DOI BibTeX RDF |
dynamic information flow, failure-relevant inputs, automated debugging, dynamic tainting |
77 | James A. Clause, Ioannis Doudalis, Alessandro Orso, Milos Prvulovic |
Effective memory protection using dynamic tainting. |
ASE |
2007 |
DBLP DOI BibTeX RDF |
illegal memory accesses, hardware support, dynamic tainting |
77 | William G. J. Halfond, Alessandro Orso, Panagiotis Manolios |
Using positive tainting and syntax-aware evaluation to counter SQL injection attacks. |
SIGSOFT FSE |
2006 |
DBLP DOI BibTeX RDF |
runtime monitoring, SQL injection, dynamic tainting |
73 | Alex Ho, Michael A. Fetterman, Christopher Clark, Andrew Warfield, Steven Hand 0001 |
Practical taint-based protection using demand emulation. |
EuroSys |
2006 |
DBLP DOI BibTeX RDF |
QEMU, demand emulation, false tainting, tainting, virtual machine, virtualization, emulation, Xen |
58 | Asia Slowinska, Herbert Bos |
Pointer tainting still pointless: (but we all see the point of tainting). |
ACM SIGOPS Oper. Syst. Rev. |
2010 |
DBLP DOI BibTeX RDF |
|
51 | William G. J. Halfond, Alessandro Orso, Pete Manolios |
WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation. |
IEEE Trans. Software Eng. |
2008 |
DBLP DOI BibTeX RDF |
Security and Protection, Protection mechanisms |
44 | James Newsome, Stephen McCamant, Dawn Song |
Measuring channel capacity to distinguish undue influence. |
PLAS |
2009 |
DBLP DOI BibTeX RDF |
model counting, quantitative information flow, channel capacity |
29 | Shi Meng, Liu Wang, Shenao Wang, Kailong Wang, Xusheng Xiao, Guangdong Bai, Haoyu Wang 0001 |
Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs. |
ASE |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Shaun Azzopardi, Joshua Ellul, Ryan Falzon, Gordon J. Pace |
Tainting in Smart Contracts: Combining Static and Runtime Verification. |
RV |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Toshinori Usui, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Kanta Matsuura |
Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks. |
RAID |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Lannan Luo, Qiang Zeng 0001, Chen Cao, Kai Chen 0012, Jian Liu 0008, Limin Liu, Neng Gao, Min Yang 0002, Xinyu Xing, Peng Liu 0005 |
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation. |
IEEE Trans. Mob. Comput. |
2020 |
DBLP DOI BibTeX RDF |
|
29 | Yi Liu, Lejian Liao, Tian Song |
Static tainting extraction approach based on information flow graph for personally identifiable information. |
Sci. China Inf. Sci. |
2020 |
DBLP DOI BibTeX RDF |
|
29 | Maysam Zoor, Ludovic Apvrille, Renaud Pacalet |
SysML models: studying safety and security measures impact on performance using graph tainting. |
MoDELS (Companion) |
2020 |
DBLP DOI BibTeX RDF |
|
29 | Tin Tironsakkul, Manuel Maarek, Andrea Eross, Mike Just |
Probing the Mystery of Cryptocurrency Theft: An Investigation into Methods for Cryptocurrency Tainting Analysis. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
29 | Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet, Routa Moussaileb |
Detection of Side Channel Attacks Based on Data Tainting in Android Systems. |
SEC |
2017 |
DBLP DOI BibTeX RDF |
|
29 | Björn Mathis |
Dynamic tainting for automatic test case generation. |
ISSTA |
2017 |
DBLP DOI BibTeX RDF |
|
29 | Martin Ussath, Feng Cheng 0002, Christoph Meinel |
Event attribute tainting: A new approach for attack tracing and event correlation. |
NOMS |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Shiqing Ma, Xiangyu Zhang 0001, Dongyan Xu |
ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting. |
NDSS |
2016 |
DBLP BibTeX RDF |
|
29 | Chi-Wei Wang, Shiuhpyng Winston Shieh |
DROIT: Dynamic Alternation of Dual-Level Tainting for Malware Analysis. |
J. Inf. Sci. Eng. |
2015 |
DBLP BibTeX RDF |
|
29 | Sandrine Blazy, Stéphanie Riaud, Thomas Sirvent |
Data tainting and obfuscation: Improving plausibility of incorrect taint. |
SCAM |
2015 |
DBLP DOI BibTeX RDF |
|
29 | Peter Mell, Richard E. Harang |
Using Network Tainting to Bound the Scope of Network Ingress Attacks. |
SERE |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Ioannis Doudalis, James A. Clause, Guru Venkataramani, Milos Prvulovic, Alessandro Orso |
Effective and Efficient Memory Protection Using Dynamic Tainting. |
IEEE Trans. Computers |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Seong Oun Hwang |
Finding Vulnerabilities in Binary Codes Using Tainting/Fuzzing Analysis. |
ICHIT (2) |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Michael Dalton, Hari Kannan, Christos Kozyrakis |
Tainting is not pointless. |
ACM SIGOPS Oper. Syst. Rev. |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Du Li |
Dynamic tainting for deployed Java programs. |
SPLASH/OOPSLA Companion |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Dejan Baca |
Identifying Security Relevant Warnings from Static Code Analysis Tools through Code Tainting. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
dua, security, data flow, coverity, Static code analysis, taint analysis, findbugs |
29 | Pankaj Dhoolia, Senthil Mani, Vibha Singhal Sinha, Saurabh Sinha |
Debugging Model-Transformation Failures Using Dynamic Tainting. |
ECOOP |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Krügel, Giovanni Vigna |
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. |
NDSS |
2007 |
DBLP BibTeX RDF |
|
29 | Anh Nguyen-Tuong, Salvatore Guarnieri, Doug Greene, Jeff Shirley, David Evans 0001 |
Automatically Hardening Web Applications Using Precise Tainting. |
SEC |
2005 |
DBLP BibTeX RDF |
|
26 | James A. Clause, Alessandro Orso |
LEAKPOINT: pinpointing the causes of memory leaks. |
ICSE (1) |
2010 |
DBLP DOI BibTeX RDF |
leak detection, dynamic tainting |
26 | Qing Zhang 0012, John McCullough, Justin Ma, Nabil Schear, Michael Vrable, Amin Vahdat, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage |
Neon: system support for derived data management. |
VEE |
2010 |
DBLP DOI BibTeX RDF |
difc, memory tainting, qemu, virtualization, xen |
22 | Masakatsu Nishigaki, Takumi Yamamoto |
Making Use of Human Visual Capability to Improve Information Security. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Stephen McCamant, Michael D. Ernst |
Quantitative information flow as network flow capacity. |
PLDI |
2008 |
DBLP DOI BibTeX RDF |
implicit flow, dynamic analysis, information-flow analysis |
22 | Ashish Gehani, John H. Reif |
Super-Resolution Video Analysis for Forensic Investigations. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2007 |
DBLP DOI BibTeX RDF |
Video recordings, super-resolution analysis, parameterization |
Displaying result #1 - #36 of 36 (100 per page; Change: )
|
|