Identification of data propagation paths for efficient dynamic information flow tracking

1Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Dynamic information flow tracking is a positive step towards the prevention of untrusted data injection and protection from possible exploits of such data. This emphasizes the importance of tracking the suspicious data flows at run-time to ensure neither the exploitation of data nor security violation. In this work, we have contemplated enhancing the competence of Static Taint Tracking (STT) to seamlessly support Dynamic Taint Tracking (DTT) using data flow analysis. The concept of definition-used (def-use) is used for source code analysis to capture the potential taint propagation paths represented using the Data Flow Graph (DFG). The extracted paths from the DFG provides prior information about all the potential taint propagation paths which extensively needed to be considered for DTT. We have tested our proposed methodology on some well-known benchmarks such as Firefox, SQLite3, Gzip, and Zlib. It is observed that the proposed method can identify all potential taint source propagation paths that cover pointers, branch conditions, inter-procedure, and inter-module data flows. The evaluation results show that this work will be very useful in guiding the dynamic taint tracking to achieve efficient and accurate detection of suspicious information flow.

Cite

CITATION STYLE

APA

Mallissery, S., Wu, Y. S., Hsieh, C. H., & Bau, C. A. (2020). Identification of data propagation paths for efficient dynamic information flow tracking. In Proceedings of the ACM Symposium on Applied Computing (pp. 92–99). Association for Computing Machinery. https://doi.org/10.1145/3341105.3373876

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free