Show simple item record

Secure Program Execution Via Dynamic Information Flow Tracking

dc.date.accessioned2005-12-19T22:06:13Z
dc.date.accessioned2018-11-24T10:23:47Z
dc.date.available2005-12-19T22:06:13Z
dc.date.available2018-11-24T10:23:47Z
dc.date.issued2003-07-21
dc.identifier.urihttp://hdl.handle.net/1721.1/30396
dc.identifier.urihttp://repository.aust.edu.ng/xmlui/handle/1721.1/30396
dc.description.abstractWe present a simple architectural mechanism called dynamicinformation flow tracking that can significantly improve thesecurity of computing systems with negligible performanceoverhead. Dynamic information flow tracking protects programs against malicious software attacks by identifying spurious information flows from untrusted I/O and restrictingthe usage of the spurious information.Every security attack to take control of a program needsto transfer the program s control to malevolent code. Inour approach, the operating system identifies a set of inputchannels as spurious, and the processor tracks all information flows from those inputs. A broad range of attacks areeffectively defeated by checking the use of the spurious values as instructions and pointers.Our protection is transparent to users or application programmers; the executables can be used without any modification. Also, our scheme only incurs, on average, a memoryoverhead of 1.4% and a performance overhead of 1.1%.
dc.format.extent12 p.
dc.format.extent23224161 bytes
dc.format.extent957525 bytes
dc.language.isoen_US
dc.titleSecure Program Execution Via Dynamic Information Flow Tracking


Files in this item

FilesSizeFormatView
MIT-CSAIL-TR-2003-004.pdf957.5Kbapplication/pdfView/Open
MIT-CSAIL-TR-2003-004.ps23.22Mbapplication/postscriptView/Open

This item appears in the following Collection(s)

Show simple item record