2016 11th International Conference on Availability, Reliability and Security (ARES) 2016
DOI: 10.1109/ares.2016.97
|View full text |Cite
|
Sign up to set email alerts
|

V-DIFT: Vector-Based Dynamic Information Flow Tracking with Application to Locating Cryptographic Keys for Reverse Engineering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…DIFT, also called Dynamic Taint Analysis (DTA), is used in a plethora of scenarios, to keep track of the information as it flows through a program's or system's execution: some inputs or data get tainted and then these taint marks (often called tags) propagate at the instruction or application level. Due to promising flexibility that DIFT offers, it has been considered for various privacy and security frameworks; not only within the IoT applet context [3], [1], but also computer and cellular environments [4], [5], [6], [2]. Specifically, in [3], the proposed DIFT keeps a single float number, usually called label, per taintable object, namely per variable, to dictate how secure it is in that applet.…”
Section: Introductionmentioning
confidence: 99%
“…DIFT, also called Dynamic Taint Analysis (DTA), is used in a plethora of scenarios, to keep track of the information as it flows through a program's or system's execution: some inputs or data get tainted and then these taint marks (often called tags) propagate at the instruction or application level. Due to promising flexibility that DIFT offers, it has been considered for various privacy and security frameworks; not only within the IoT applet context [3], [1], but also computer and cellular environments [4], [5], [6], [2]. Specifically, in [3], the proposed DIFT keeps a single float number, usually called label, per taintable object, namely per variable, to dictate how secure it is in that applet.…”
Section: Introductionmentioning
confidence: 99%