Publication | Closed Access
Dytan
530
Citations
23
References
2007
Year
Unknown Venue
EngineeringTaint AnalysisInformation SecurityDynamic Taint AnalysisSoftware AnalysisFormal VerificationDynamic TaintingStatic CheckingRuntime VerificationStatic AnalysisComputer EngineeringComputer ScienceStatic Program AnalysisLanguage-based SecurityData SecuritySoftware SecurityProgram AnalysisSoftware TestingSystem Software
Dynamic taint analysis is gaining momentum and has been applied to security, program understanding, testing, and debugging, but existing approaches are ad‑hoc, focus only on data‑flow, and ignore control‑flow, limiting their extensibility and applicability beyond security. The authors defined a general, highly flexible, customizable framework for dynamic tainting that supports both data‑flow and control‑flow tainting conservatively without requiring a custom runtime system. They implemented this framework as DYTAN, an x86 executable analyzer, and conducted preliminary studies demonstrating that DYTAN can be used to implement various tainting approaches with limited effort. The studies, including experiments on Firefox, show that DYTAN can analyze real software and that the choice of tainting approach influences efficiency and accuracy, supporting the framework’s utility for experimenting with different variants.
Dynamic taint analysis is gaining momentum. Techniques based on dynamic tainting have been successfully used in the context of application security, and now their use is also being explored in different areas, such as program understanding, software testing, and debugging. Unfortunately, most existing approaches for dynamic tainting are defined in an ad-hoc manner, which makes it difficult to extend them, experiment with them, and adapt them to new contexts. Moreover, most existing approaches are focused on data-flow based tainting only and do not consider tainting due to control flow, which limits their applicability outside the security domain. To address these limitations and foster experimentation with dynamic tainting techniques, we defined and developed a general framework for dynamic tainting that (1) is highly flexible and customizable, (2) allows for performing both data-flow and control-flow based tainting conservatively, and (3) does not rely on any customized run-time system. We also present DYTAN, an implementation of our framework that works on x86 executables, and a set of preliminary studies that show how DYTAN can be used to implement different tainting-based approaches with limited effort. In the studies, we also show that DYTAN can be used on real software, by using FIREFOX as one of our subjects, and illustrate how the specific characteristics of the tainting approach used can affect efficiency and accuracy of the taint analysis, which further justifies the use of our framework to experiment with different variants of an approach.
| Year | Citations | |
|---|---|---|
Page 1
Page 1