Please use this identifier to cite or link to this item: https://www.um.edu.mt/library/oar/handle/123456789/23091
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGalea, John-
dc.contributor.authorVella, Mark Joseph-
dc.date.accessioned2017-10-30T15:42:06Z-
dc.date.available2017-10-30T15:42:06Z-
dc.date.issued2014-11-
dc.identifier.citationGalea, J., & Vella, M. (2014). Using dynamic binary analysis for tracking pointer data. Computer Science Annual Workshop CSAW’14, Msida. 1-2.en_GB
dc.identifier.urihttps://www.um.edu.mt/library/oar//handle/123456789/23091-
dc.description.abstractThe examination and monitoring of binaries during runtime, referred to as dynamic binary analysis, is a widely adopted approach, especially in the field of security and software vulnerabilities. Fundamentally, it provides one with a means to understand and reason about binary executions. There are various applications of dynamic binary analysis, including vulnerability analysis, malware analysis, and Web security. One technique typically employed to perform dynamic analysis is taint analysis, which revolves around inspecting interesting information flows [3]. In this approach, taint marks are associated with values that are (1) introduced via defined sources and (2) propagated to other values to keep track of information flow. Marks may also be removed (untainted) once a defined sink has been reached. In addition, taint checking is also carried out in order to determine whether or not certain runtime behaviours of the program occur. The properties describing how taint analysis is performed, i.e taint introduction, propagation and checking, are specified by a set of rules referred to as a taint policy. One convenient way to define taint rules is in the form of operational semantics rules, as it avoids ambiguity issues. Rule 1 specifies the general form of a taint rule used in this paper. Given the current machine context of the program 4 and a statement, the rule specifies the end result, after the computation has been carried out.en_GB
dc.language.isoenen_GB
dc.publisherUniversity of Malta. Faculty of ICTen_GB
dc.rightsinfo:eu-repo/semantics/openAccessen_GB
dc.subjectComputer securityen_GB
dc.subjectWeb services -- Security measuresen_GB
dc.subjectBinary control systemsen_GB
dc.titleUsing dynamic binary analysis for tracking pointer dataen_GB
dc.typeconferenceObjecten_GB
dc.rights.holderThe copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holder.en_GB
dc.bibliographicCitation.conferencenameComputer Science Annual Workshop CSAW’14en_GB
dc.bibliographicCitation.conferenceplaceMsida, Malta, 6-7/11/2014en_GB
dc.description.reviewedpeer-revieweden_GB
Appears in Collections:Scholarly Works - FacICTCS

Files in This Item:
File Description SizeFormat 
Proceedings of CSAW’14 - A5.pdf199.83 kBAdobe PDFView/Open


Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.