Abstract | ||
---|---|---|
Dynamic Information Flow Tracking has been successfully used to prevent a wide range of attacks and detect illegal access to sensitive information. Most proposed solutions only track the explicit information flow where the taint is propagated through data dependencies. However, recent evasion attacks exploit implicit flows, that use control flow in the application, to manipulate the data thus making the malicious activity undetectable. We propose NIFT - a nested implicit flow tracking mechanism that extends explicit propagation to instructions affected by a control dependency. Our technique generates taint instructions at compile time which are executed by specialized hardware to propagate taint implicitly even in cases of deeply-nested branches. In addition, we propose a restricted taint propagation for data executed in conditional branches that affects only immediate instructions instead of all instructions inside the branch scope. Our technique efficiently locates implicit flows and resolves them with negligible performance overhead. Moreover, it mitigates the over-tainting problem.
|
Year | DOI | Venue |
---|---|---|
2020 | 10.1145/3387902.3392614 | CF '20: Computing Frontiers Conference
Catania
Sicily
Italy
May, 2020 |
Keywords | DocType | ISBN |
Implicit Taint Tracking, Dynamic Information Flow Tracking, Hardware Design | Conference | 978-1-4503-7956-4 |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Leandro S. de Araújo | 1 | 0 | 0.34 |
Leandro A. J. Marzulo | 2 | 49 | 11.56 |
Tiago A. O. Alves | 3 | 45 | 8.34 |
Felipe M. França | 4 | 16 | 4.85 |
Israel Koren | 5 | 1579 | 175.07 |
Sandip Kundu | 6 | 1103 | 137.18 |