1 Hit in 1.6 sec

Coarse-grained Dynamic Taint Analysis for Defeating Control and Non-control Data Attacks [article]

Pankaj Kohli
2009 arXiv   pre-print
We performed extensive experimental evaluation of our approach and show that it can detect all critical attacks such as buffer overflows, and format string attacks, including non-control data attacks.  ...  Memory corruption attacks remain the primary threat for computer security. Information flow tracking or taint analysis has been proven to be effective against most memory corruption attacks.  ...  Other approaches like FormatGuard [20] , FormatShield [21] , LibFormat [22] , Kimchi [23] , Lisbon [24] , White-Listing [25] defend against format string attacks.  ... 
arXiv:0906.4481v2 fatcat:y2wyjl5pufa4bfds3isynqytdu