2016
DOI: 10.1007/s11859-016-1133-1
|View full text |Cite
|
Sign up to set email alerts
|

SwordDTA: A dynamic taint analysis tool for software vulnerability detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 9 publications
0
5
0
1
Order By: Relevance
“…As principais ferramentas encontradas na revisão sistemática, listadas na Tabela 4, trazem funcionalidades voltadas ao teste de seguranc ¸a, como o teste de invasão e análise estática [Cai et al 2016, Nunes et al 2018, Trunde and Weippl 2015. Ao todo foram selecionados 21 artigos para esta subsec ¸ão.…”
Section: Ferramentas E Frameworkunclassified
“…As principais ferramentas encontradas na revisão sistemática, listadas na Tabela 4, trazem funcionalidades voltadas ao teste de seguranc ¸a, como o teste de invasão e análise estática [Cai et al 2016, Nunes et al 2018, Trunde and Weippl 2015. Ao todo foram selecionados 21 artigos para esta subsec ¸ão.…”
Section: Ferramentas E Frameworkunclassified
“…Therefore, the concatenated String value is tainted and when it used as input to eval the instrumentation throws an error to prevent the code it contains from being executed. Dynamic taint analysis also has applications to vulnerability detection in binaries [20], attack prevention [32,37,47,54,56,57,64,68], malware analysis [28,46,49,65,67], fuzz-testing [21,22,30,34], debugging [24], program comprehension [44,45,66], reverse engineering [19,25,27], and other fields.…”
Section: Dynamic Taint Analysismentioning
confidence: 99%
“…The operator, such as + or !, is provided as metadata by the instrumented node. Some taint analysis applications, such as Cai et al [20], require this metadata to determine, e.g., whether an overflow occurred in the operation. Furthermore, it is not uncommon in low-level taint analyses to drop taint when, e.g., a value is XOR'd with itself or ANDed with a constant 0.…”
Section: Propagation Semanticsmentioning
confidence: 99%
See 1 more Smart Citation
“…SwordDTA [20] proposed by CAJ Jun detects malware through vulnerability modeling and taint propagation. For mobile Atlantis Highlights in Engineering, volume 3 malware detection, Y Aafer proposed DroidAPIMiner [21] to extract the relevant functions of the captured API-level malware.…”
Section: F Malware Detectionmentioning
confidence: 99%