A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Assessing the Trustworthiness of Drivers
[chapter]
2012
Lecture Notes in Computer Science
Drivers, especially third party drivers, could contain malicious code (e.g., logic bombs) or carefully designed-in vulnerabilities. Generally, it is extremely difficult for static analysis to identify these code and vulnerabilities. Without knowing the exact triggers that cause the execution/exploitation of these code/vulnerabilities, dynamic taint analysis cannot help either. In this paper, we propose a novel crossbrand comparison approach to assess the drivers in a honeypot or testing
doi:10.1007/978-3-642-33338-5_3
fatcat:wo4udsaipre2ri6b2k7wensu5q