Export Citations
1 Results for: Keyword: false tainting
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
Searched The ACM Guide to Computing Literature (3,740,402 records)|Limit your search to The ACM Full-Text Collection (753,050 records)
- ArticleApril 2006
Practical taint-based protection using demand emulation
EuroSys '06: Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006April 2006, Pages 29–41https://doi.org/10.1145/1217935.1217939Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a well-known technique, data tainting, to track data received from the network as it propagates through a system and to prevent its ...
Also Published in:
ACM SIGOPS Operating Systems Review: Volume 40 Issue 4, October 2006