Please use this identifier to cite or link to this item:
https://www.um.edu.mt/library/oar/handle/123456789/23091
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Galea, John | - |
dc.contributor.author | Vella, Mark Joseph | - |
dc.date.accessioned | 2017-10-30T15:42:06Z | - |
dc.date.available | 2017-10-30T15:42:06Z | - |
dc.date.issued | 2014-11 | - |
dc.identifier.citation | Galea, J., & Vella, M. (2014). Using dynamic binary analysis for tracking pointer data. Computer Science Annual Workshop CSAW’14, Msida. 1-2. | en_GB |
dc.identifier.uri | https://www.um.edu.mt/library/oar//handle/123456789/23091 | - |
dc.description.abstract | The examination and monitoring of binaries during runtime, referred to as dynamic binary analysis, is a widely adopted approach, especially in the field of security and software vulnerabilities. Fundamentally, it provides one with a means to understand and reason about binary executions. There are various applications of dynamic binary analysis, including vulnerability analysis, malware analysis, and Web security. One technique typically employed to perform dynamic analysis is taint analysis, which revolves around inspecting interesting information flows [3]. In this approach, taint marks are associated with values that are (1) introduced via defined sources and (2) propagated to other values to keep track of information flow. Marks may also be removed (untainted) once a defined sink has been reached. In addition, taint checking is also carried out in order to determine whether or not certain runtime behaviours of the program occur. The properties describing how taint analysis is performed, i.e taint introduction, propagation and checking, are specified by a set of rules referred to as a taint policy. One convenient way to define taint rules is in the form of operational semantics rules, as it avoids ambiguity issues. Rule 1 specifies the general form of a taint rule used in this paper. Given the current machine context of the program 4 and a statement, the rule specifies the end result, after the computation has been carried out. | en_GB |
dc.language.iso | en | en_GB |
dc.publisher | University of Malta. Faculty of ICT | en_GB |
dc.rights | info:eu-repo/semantics/openAccess | en_GB |
dc.subject | Computer security | en_GB |
dc.subject | Web services -- Security measures | en_GB |
dc.subject | Binary control systems | en_GB |
dc.title | Using dynamic binary analysis for tracking pointer data | en_GB |
dc.type | conferenceObject | en_GB |
dc.rights.holder | The copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holder. | en_GB |
dc.bibliographicCitation.conferencename | Computer Science Annual Workshop CSAW’14 | en_GB |
dc.bibliographicCitation.conferenceplace | Msida, Malta, 6-7/11/2014 | en_GB |
dc.description.reviewed | peer-reviewed | en_GB |
Appears in Collections: | Scholarly Works - FacICTCS |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Proceedings of CSAW’14 - A5.pdf | 199.83 kB | Adobe PDF | View/Open |
Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.