Title
DTAD: A Dynamic Taint Analysis Detector for Information Security
Abstract
Information infection and information leakage in computer systems are mainly caused by insecure network access. Considering the particularity of network security, a tool DTAD (Dynamic Taint Analysis Detector) for information flow security detection is designed and implemented, aiming at the problem of data security in network access. This tool performs log recording and state controlling for malicious access and virus vulnerability using the state-control characteristic of virtual machines. Defense systems capture network data by executing applications to determine whether these accesses (i.e. target jumping, function address and instruction access) are legitimate or not. Once an attack is detected, the tool records states of the virtual machine at the process level as well as the kernel level. For attacks caused by malicious code, the tool injects its own diagnostic code into the process space of running programs to substitute the malicious code, as a result, related information for the attacked process is collected. The tool is able to generate precise signatures for network intrusion detection by associating and comparing network data recorded in log files with process information collected by the virtual machine, the whole process is finished automatically. The tool can also precisely identify attack types and provide effective protection measures through fast signature releasing. Experiments have validated the efficiency of the tool in attack recognition and information protection, and indicated that this detection and protection system is effective in recognizing, tracking and processing taint data.
Year
DOI
Venue
2008
10.1109/WAIM.2008.60
WAIM
Keywords
Field
DocType
information management,registers,data security,detectors,operating systems,kernel,diagnostic code,information analysis,intrusion detection,virtual machine,information security,network security,information flow,information protection,computer viruses,data structures,virtual machines,network access
Information flow (information theory),Data mining,Data security,Attack model,Computer science,Information protection policy,Network security,Computer virus,Information security,Taint checking
Conference
Volume
Issue
Citations 
null
null
1
PageRank 
References 
Authors
0.39
14
6
Name
Order
Citations
PageRank
Zhiwen Bai181.90
Liming Wang2575.98
Jinglin Chen310.72
Lin Xu410.39
Jian Liu5315.77
Xiyang Liu615918.55