Taint

Results: 199



#Item
61Dataflow / Symbolic execution / Algorithm / Information flow / Dependence analysis / Pointer / Information / Taint checking / Computing / Software engineering / Parallel computing

DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation Min Gyung Kang∗† Stephen McCamant† Pongsin Poosankam∗† Dawn Song† † UC Berkeley ∗ Carnegie Mellon University {mgkang,ppoosank}@cmu.edu

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
62Symbolic execution / Symbol / Algorithm / Computing / KeY / Dynamical system / Applied mathematics / Formal methods / Computer programming / Taint checking

All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) Edward J. Schwartz, Thanassis Avgerinos, David Brumley Carnegie Mellon University Pittsburgh, PA

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
63Symbolic execution / Symbol / Algorithm / Computing / KeY / Dynamical system / Applied mathematics / Formal methods / Computer programming / Taint checking

All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) Edward J. Schwartz, Thanassis Avgerinos, David Brumley Carnegie Mellon University Pittsburgh, PA

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2012-03-12 11:18:03
64Abstract data types / Cross-platform software / Procedural programming languages / Static program analysis / Program slicing / Software maintenance / Priority queue / Pointer / C / Computing / Software engineering / Programming language theory

TAJ: Effective Taint Analysis of Web Applications Omer Tripp IBM Software Group [removed] Marco Pistoia

Add to Reading List

Source URL: manu.sridharan.net

Language: English - Date: 2015-03-03 14:08:09
65Symbolic execution / David Brumley / Higher education / Academia / Computer programming / Taint checking / Carnegie Mellon University

All You Ever Wanted to Know About Dynamic Taint Analysis & Forward Symbolic Execution (but might have been afraid to ask) (Yes, we were trying to overflow the title length field

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2010-08-16 00:26:51
66Computer programming / Data-flow analysis / Pointer / Application security / SQL / Buffer overflow / Dataflow / Taint checking / Computing / Software engineering / Computer security

Dytan: A Generic Dynamic Taint Analysis Framework James Clause, Wanchun Li, and Alessandro Orso College of Computing Georgia Institute of Technology {clause|wli7|orso}@cc.gatech.edu

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2007-07-12 05:25:09
67Cyberwarfare / Stack buffer overflow / Buffer overflow / Uncontrolled format string / Vulnerability / Valgrind / C / Malware / Pointer / Computing / Software bugs / Software engineering

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome [removed] Carnegie Mellon University Abstract

Add to Reading List

Source URL: valgrind.org

Language: English - Date: 2006-08-12 00:33:35
68Symbolic execution / David Brumley / Pennsylvania / Higher education / Academia / Computer programming / Taint checking / Carnegie Mellon University

All You Ever Wanted to Know About Dynamic Taint Analysis & Forward Symbolic Execution (but might have been afraid to ask) (Yes, we were trying to overflow the title length field

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-12-17 15:18:11
UPDATE