DocumentCode :
2946336
Title :
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
Author :
Schwartz, Edward J. ; Avgerinos, Thanassis ; Brumley, David
Author_Institution :
Carnegie Mellon Univ., Pittsburgh, PA, USA
fYear :
2010
fDate :
16-19 May 2010
Firstpage :
317
Lastpage :
331
Abstract :
Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analyses. Example applications of dynamic taint analysis and forward symbolic execution include malware analysis, input filter generation, test case generation, and vulnerability discovery. Despite the widespread usage of these two techniques, there has been little effort to formally define the algorithms and summarize the critical issues that arise when these techniques are used in typical security contexts. The contributions of this paper are two-fold. First, we precisely describe the algorithms for dynamic taint analysis and forward symbolic execution as extensions to the run-time semantics of a general language. Second, we highlight important implementation choices, common pitfalls, and considerations when using these techniques in a security context.
Keywords :
Computerized monitoring; Filters; Heuristic algorithms; Information analysis; Information security; Performance analysis; Privacy; Reactive power; Runtime; Testing; dynamic analysis; symbolic execution; taint analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy (SP), 2010 IEEE Symposium on
Conference_Location :
Oakland, CA, USA
ISSN :
1081-6011
Print_ISBN :
978-1-4244-6894-2
Electronic_ISBN :
1081-6011
Type :
conf
DOI :
10.1109/SP.2010.26
Filename :
5504796
Link To Document :
بازگشت