{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T04:11:06Z","timestamp":1741925466741,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642251405"},{"type":"electronic","value":"9783642251412"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25141-2_8","type":"book-chapter","created":{"date-parts":[[2011,10,22]],"date-time":"2011-10-22T13:30:01Z","timestamp":1319290201000},"page":"113-128","source":"Crossref","is-referenced-by-count":11,"title":["Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking"],"prefix":"10.1007","author":[{"given":"Angeliki","family":"Zavou","sequence":"first","affiliation":[]},{"given":"Georgios","family":"Portokalidis","sequence":"additional","affiliation":[]},{"given":"Angelos D.","family":"Keromytis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Attariyan, M., Flinn, J.: Automating configuration troubleshooting with dynamic information flow analysis. In: Proceedings of the 9th Symposium on Operating Systems Design and Implementation (OSDI), pp. 1\u201311 (2010)"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: Proceedings of the 19th Symposium on Operating Systems Principles (SOSP), pp. 164\u2013177 (2003)","DOI":"10.1145\/945445.945462"},{"key":"8_CR3","unstructured":"Bellard, F.: QEMU, a fast and portable dynamic translator. In: Proceedings of the USENIX Annual Technical Conference, pp. 41\u201346 (April 2005)"},{"key":"8_CR4","unstructured":"Bochs: The cross platform IA-32 emulator (2001), http:\/\/bochs.sourceforge.net"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Borin, E., Wang, C., Wu, Y., Araujo, G.: Software-based transparent and comprehensive control-flow error detection. In: Proceedings of the International Symposium on Code Generation and Optimization (CGO), pp. 333\u2013345 (2006)","DOI":"10.1109\/CGO.2006.33"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Cheng, W., Zhao, Q., Yu, B., Hiroshige, S.: TaintTrace: Efficient flow tracing with dynamic binary rewriting. In: Proceedings of the IEEE Symposium on Computers and Communications (ISCC), pp. 749\u2013754 (2006)","DOI":"10.1109\/ISCC.2006.158"},{"key":"8_CR7","unstructured":"Chow, J., Pfaff, B., Garfinkel, T., Christopher, K., Rosenblum, M.: Understanding Data Lifetime via Whole System Simulation. In: Proceedings of the 13th USENIX Security Symposium, pp. 321\u2013336 (2004)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Clause, J., Li, W., Orso, A.: Dytan: a generic dynamic taint analysis framework. In: Proceedings of the 2007 International Symposium on Software Testing and Analysis (ISSTA), pp. 196\u2013206 (2007)","DOI":"10.1145\/1273463.1273490"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Crandall, J.R., Chong, F.T.: Minos: Control data attack prevention orthogonal to memory model. In: Proceedings of the 37th Annual International Symposium on Microarchitecture, pp. 221\u2013232 (2004)","DOI":"10.1109\/MICRO.2004.26"},{"key":"8_CR10","unstructured":"Dalton, M., Kannan, H., Kozyrakis, C.: Real-world buffer overflow protection for userspace & kernelspace. In: Proceedings of the 17th USENIX Security Symposium, pp. 395\u2013410 (2008)"},{"key":"8_CR11","unstructured":"Davis, B., Chen, H.: DBTaint: cross-application information flow tracking via databases. In: Proceedings of the 2010 USENIX Conference on Web Application Development, WebApps (2010)"},{"key":"8_CR12","unstructured":"Enck, W., Gilbert, P., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th Symposium on Operating Systems Design and Implementation (OSDI), pp. 393\u2013407 (2010)"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Ho, A., Fetterman, M., Warfield, C.C.A., Hand, S.: Practical taint-based protection using demand emulation. In: Proceedings of the 1st European Conference on Computer Systems (EuroSys), pp. 29\u201341 (2006)","DOI":"10.1145\/1217935.1217939"},{"key":"8_CR14","unstructured":"Kemerlis, V.P.: libdft (2010), http:\/\/www.cs.columbia.edu\/~vpk\/research\/libdft\/"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Luk, C.K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: Building customized program analysis tools with dynamic instrumentation. In: Proceedings of the Conference on Programming Language Design and Implementation (PLDI), pp. 190\u2013200 (2005)","DOI":"10.1145\/1065010.1065034"},{"key":"8_CR16","unstructured":"McVoy, L., Staelin, C.: lmbench (2005), http:\/\/lmbench.sourceforge.net\/"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Mysore, S., Mazloom, B., Agrawal, B., Sherwood, T.: Understanding and visualizing full systems with data flow tomography. In: Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp. 211\u2013221 (2008)","DOI":"10.1145\/1346281.1346308"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Nethercote, N., Seward, J.: Valgrind: A framework for heavyweight dynamic binary instrumentation. In: Proceedings of the Conference on Programming Language Design and Implementation (PLDI), pp. 89\u2013100 (2007)","DOI":"10.1145\/1250734.1250746"},{"key":"8_CR19","unstructured":"Newsome, J., Song, D.: Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: Proceedings of the 12th Annual Network and Distributed System Security Symposium, NDSS (2005)"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Portokalidis, G., Slowinska, A., Bos, H.: Argos: an emulator for fingerprinting zero-day attacks. In: Proceedings of the 1st European Conference on Computer Systems (EuroSys), pp. 15\u201327 (2006)","DOI":"10.1145\/1218063.1217938"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Qin, F., Wang, C., Li, Z., Kim, H.s., Zhou, Y., Wu, Y.: LIFT: A low-overhead practical information flow tracking system for detecting security attacks. In: Proceedings of the 39th Annual International Symposium on Microarchitecture, pp. 135\u2013148 (2006)","DOI":"10.1109\/MICRO.2006.29"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Slowinska, A., Bos, H.: Pointless tainting? Evaluating the practicality of pointer tainting. In: Proceedings of EuroSys 2009, Nuremberg, Germany (March-April 2009)","DOI":"10.1145\/1519065.1519073"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Lee, J., Devadas, S.: Secure program execution via dynamic information flow tracking. In: Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp. 85\u201396 (2004)","DOI":"10.1145\/1024393.1024404"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Vachharajani, N., Bridges, M.J., Chang, J., Rangan, R., Ottoni, G., Blome, J.A., Reis, G.A., Vachharajani, M., August, D.I.: RIFLE: An architectural framework for user-centric information-flow security. In: Proceedings of the 37th International Symposium on Microarchitecture (MICRO), pp. 243\u2013254 (2004)","DOI":"10.1109\/MICRO.2004.31"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Wang, T., Wei, T., Gu, G., Zou, W.: TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 497\u2013512 (2010)","DOI":"10.1109\/SP.2010.37"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Xu, W., Bhatkar, S., Sekar, R.: Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks. In: Proceedings of the 15th USENIX Security Symposium (2006)","DOI":"10.1109\/SP.2006.12"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Yin, H., Song, D., Egele, M., Kruegel, C., Kirda, E.: Panorama: capturing system-wide information flow for malware detection and analysis. In: Proceedings of the 14th Conference on Computer and Communications Security (CCS), pp. 116\u2013127 (2007)","DOI":"10.1145\/1315245.1315261"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, Q., McCullough, J., Ma, J., Schear, N., Vrable, M., Vahdat, A., Snoeren, A.C., Voelker, G.M., Savage, S.: Neon: system support for derived data management. In: Proceedings of the 6th International Conference on Virtual Execution Environments (VEE), pp. 63\u201374 (2010)","DOI":"10.1145\/1735997.1736008"},{"key":"8_CR29","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1145\/1945023.1945039","volume":"45","author":"D. Zhu","year":"2011","unstructured":"Zhu, D., Jung, J., Song, D., Kohno, T., Wetherall, D.: TaintEraser: protecting sensitive data leaks using application-level taint tracking. SIGOPS Operating Systems Review\u00a045, 142\u2013154 (2011)","journal-title":"SIGOPS Operating Systems Review"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25141-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T05:49:46Z","timestamp":1741844986000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25141-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642251405","9783642251412"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25141-2_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}