Publication | Closed Access
Control flow obfuscation with information flow tracking
35
Citations
29
References
2009
Year
Unknown Venue
EngineeringInformation SecurityComputer ArchitectureSoftware EngineeringSoftware AnalysisHardware SecurityAdditional TagsSecure ComputingRuntime VerificationInformation Flow TrackingComputer EngineeringData PrivacyComputer ScienceTaint TrackingStatic Program AnalysisControl Flow ObfuscationLanguage-based SecurityData SecurityCryptographySoftware SecurityProgram AnalysisInformation HidingObfuscation (Software)System Software
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is usually referred to as information flow tracking, has been widely applied to secure software execution (e.g., taint tracking), protect software privacy and improve performance (e.g., control speculation).
| Year | Citations | |
|---|---|---|
Page 1
Page 1