A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Raksha
2007
Proceedings of the 34th annual international symposium on Computer architecture - ISCA '07
High-level semantic vulnerabilities such as SQL injection and crosssite scripting have surpassed buffer overflows as the most prevalent security exploits. The breadth and diversity of software vulnerabilities demand new security solutions that combine the speed and practicality of hardware approaches with the flexibility and robustness of software systems. This paper proposes Raksha, an architecture for software security based on dynamic information flow tracking (DIFT). Raksha provides three
doi:10.1145/1250662.1250722
dblp:conf/isca/DaltonKK07
fatcat:6ve3ir4yq5epxh5dkq5oqtmhma