PPT-Taint tracking
Author : trish-goza | Published Date : 2017-07-02
Suman Jana Dynamic Taint Analysis Track information flow through a program at runtime Identify sources of taint TaintSeed What are you tracking Untrusted input
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "Taint tracking" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Taint tracking: Transcript
Suman Jana Dynamic Taint Analysis Track information flow through a program at runtime Identify sources of taint TaintSeed What are you tracking Untrusted input Sensitive data Taint Policy . CRAVE INFOTECH. . CRAVE INFOTECH - Overview. Independent Software Solutions Vendor (ISSV) promoted by seasoned technocrats. We are the authorized SAP and Sybase software & services partner. We are a ISO 9000 certified company. Istemi. Ekin Akkus. 1. , . Ruichuan. Chen. 1. , Michaela Hardt. 2. , . Paul Francis. 1. , Johannes Gehrke. 3. 1. . Max Planck Institute for Software Systems. 2 Twitter Inc.. 3 Cornell University. Web Analytics. (but might have been afraid to ask). IEEE S&P 2010. Overview. Two Main Contributions. Precisely describe the algorithms for dynamic taint analysis and forward symbolic execution as extensions to the run-time semantics of a general language. Avinash Mohak. Visual Object Tracking. Basic Problem: . Given a target object, we need to estimate its location over time. . Previous Works:. Tracking-by-Detection. Adaptive Tracking-by-Detection. Yinzhi Cao. Reference: . http. ://www.cs.tau.ac.il/~. omertrip/pldi09/TAJ.ppt. www.cs.cmu.edu/~. soonhok/talks/20110301.pdf. 2. Motivating Example. *. * Inspired by . Refl1. in. SecuriBench Micro. Taint Flow #1. Ron Rivest. Crypto in the Clouds Workshop, MIT Rump Session Talk. August 4, 2008. Taint . Common term in software security. Any external input is . tainted. . . A computation with a . tainted. input produces . Ron Rivest. Crypto in the Clouds Workshop, MIT Rump Session Talk. August 4, 2008. Taint . Common term in software security. Any external input is . tainted. . . A computation with a . tainted. input produces . Peter N. Sam-. Kpakra. Deputy Financial Secretary. Ministry of Finance and Economic Development (MoFED). Sierra Leone. PRESENTATION OUTLINE. Overview of Immunization Expenditure Tracking Process in . by Human nose. Validation of the hot water method. Lene Meinert, ph.d.. DMRI, Center of Meat Quality. lme@dti.dk. Background . Presentation of the hot water method. Validation work. Procedure for test and training of assessors. Yinzhi Cao. Reference: . http. ://www.cs.tau.ac.il/~. omertrip/pldi09/TAJ.ppt. www.cs.cmu.edu/~. soonhok/talks/20110301.pdf. 2. Motivating Example. *. * Inspired by . Refl1. in. SecuriBench Micro. Taint Flow #1. About Dynamic . Taint . Analysis & Forward . Symbolic . Execution (. but might have been afraid to ask. ). Edward J. Schwartz, . ThanassisAvgerinos. , David . Brumley. Presented by: . Vaibhav . Rastogi. Dynamic Taint Analysis. Track information flow through a program at runtime. Identify sources of taint – . “. TaintSeed. ”. What are you tracking?. Untrusted input. Sensitive data. Taint Policy – . Presentation by Jonathan Kaan DeBoy. Paper by Hyunggi Cho, Paul E. Rybski and Wende Zhang. 1. Motivation. B. uild understanding . of surrounding. D. etect . vulnerable road users (VRU). B. icyclist. M. Realtime. Privacy. Monitoring On Smartphones. Authors:. William . Enck. The . Pennsylvania State . University . Peter Gilbert Duke University . Byung-Gon. Chun Intel Labs . Landon . P. . Cox Duke University .
Download Document
Here is the link to download the presentation.
"Taint tracking"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents