{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:35:20Z","timestamp":1772908520938,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":51,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642412837","type":"print"},{"value":"9783642412844","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41284-4_21","type":"book-chapter","created":{"date-parts":[[2013,10,22]],"date-time":"2013-10-22T17:35:11Z","timestamp":1382463311000},"page":"411-431","source":"Crossref","is-referenced-by-count":29,"title":["CloudFence: Data Flow Tracking as a Cloud Service"],"prefix":"10.1007","author":[{"given":"Vasilis","family":"Pappas","sequence":"first","affiliation":[]},{"given":"Vasileios P.","family":"Kemerlis","sequence":"additional","affiliation":[]},{"given":"Angeliki","family":"Zavou","sequence":"additional","affiliation":[]},{"given":"Michalis","family":"Polychronakis","sequence":"additional","affiliation":[]},{"given":"Angelos D.","family":"Keromytis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"AWS taps social networks for identity verification, http:\/\/www.theregister.co.uk\/2013\/05\/29\/aws_social_identity_verification"},{"key":"21_CR2","unstructured":"Login with Amazon, http:\/\/login.amazon.com\/"},{"key":"21_CR3","unstructured":"SiteBar: Multiple issues, http:\/\/www.securityfocus.com\/archive\/1\/483364"},{"key":"21_CR4","unstructured":"VirtueMart Multiple SQL Injection Vulnerabilities, http:\/\/www.securityfocus.com\/bid\/37963"},{"key":"21_CR5","unstructured":"Attariyan, M., Flinn, J.: Automating configuration troubleshooting with dynamic information flow analysis. In: Proc. of OSDI (2010)"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Bello, L., Russo, A.: Towards a Taint Mode for Cloud Computing Web Applications. In: Proc. of PLAS, pp. 1\u201312 (2012)","DOI":"10.1145\/2336717.2336724"},{"issue":"1","key":"21_CR7","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MC.2012.16","volume":"45","author":"H. Berghel","year":"2012","unstructured":"Berghel, H.: Identity Theft and Financial Fraud: Some Strangeness in the Proportions. Computer\u00a045(1), 86\u201389 (2012)","journal-title":"Computer"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Bisht, P., Hinrichs, T., Skrupsky, N., Venkatakrishnan, V.N.: WAPTEC: Whitebox Analysis of Web Applications for Parameter Tampering Exploit Construction. In: Proc. of CCS, pp. 575\u2013586 (2011)","DOI":"10.1145\/2046707.2046774"},{"key":"21_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-23644-0_1","volume-title":"Recent Advances in Intrusion Detection","author":"E. Bosman","year":"2011","unstructured":"Bosman, E., Slowinska, A., Bos, H.: Minemu: The World\u2019s Fastest Taint Tracker. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol.\u00a06961, pp. 1\u201320. Springer, Heidelberg (2011)"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Bowers, K.D., Juels, A., Oprea, A.: HAIL: a High-Availability and Integrity Layer for Cloud Storage. In: Proc. of CCS, pp. 187\u2013198 (2009)","DOI":"10.1145\/1653662.1653686"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Brown, A., Chase, J.: Trusted Platform-as-a-Service: A Foundation for Trustworthy Cloud-Hosted Applications. In: Proc. of CCSW, pp. 15\u201320 (2011)","DOI":"10.1145\/2046660.2046665"},{"key":"21_CR12","unstructured":"Chen, Y., Paxson, V., Katz, R.H.: What\u2019s New About Cloud Computing Security? Tech. Rep. UCB\/EECS-2010-5, EECS Department, University of California, Berkeley (January 2010), http:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/2010\/EECS-2010-5.html"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Cheng, W., Zhao, Q., Yu, B., Hiroshige, S.: TaintTrace: Efficient Flow Tracing with Dynamic Binary Rewriting. In: Proc. of ISCC, pp. 749\u2013754 (2006)","DOI":"10.1109\/ISCC.2006.158"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Clause, J., Li, W., Orso, A.: Dytan: A Generic Dynamic Taint Analysis Framework. In: Proc. of ISSTA, pp. 196\u2013206 (2007)","DOI":"10.1145\/1273463.1273490"},{"key":"21_CR15","unstructured":"Computerworld: Microsoft BPOS cloud service hit with data breach (December 2010), http:\/\/www.computerworld.com\/s\/article\/9202078\/Microsoft_BPOS_cloud_service_hit_with_data_breach"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Crandall, J.R., Chong, F.T.: Minos: Control Data Attack Prevention Orthogonal to Memory Model. In: Proc. of MICRO, pp. 221\u2013232 (2004)","DOI":"10.1109\/MICRO.2004.26"},{"key":"21_CR17","unstructured":"Davis, B., Chen, H.: DBTaint: Cross-Application Information Flow Tracking via Databases. In: Proc. of WebApps (2010)"},{"key":"21_CR18","unstructured":"Enck, W., Gilbert, P., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In: Proc. of OSDI (2010)"},{"key":"21_CR19","unstructured":"Feldman, A.J., Zeller, W.P., Freedman, M.J., Felten, E.W.: SPORC: Group Collaboration using Untrusted Cloud Resources. In: Proc. of OSDI (2010)"},{"key":"21_CR20","unstructured":"Geambasu, R., Kohno, T., Levy, A.A., Levy, H.M.: Vanish: Increasing Data Privacy with Self-Destructing Data. In: Proc. of USENIX Sec., pp. 299\u2013316 (2009)"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully Homomorphic Encryption Using Ideal Lattices. In: Proc. of STOC, pp. 169\u2013178 (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"21_CR22","unstructured":"Kang, M.G., McCamant, S., Poosankam, P., Song, D.: DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation. In: Proc. of NDSS (2011)"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Kemerlis, V.P., Portokalidis, G., Jee, K., Keromytis, A.D.: libdft: Practical Dynamic Data Flow Tracking for Commodity Systems. In: Proc. of VEE (2012)","DOI":"10.1145\/2151024.2151042"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Kim, H.C., Keromytis, A.D., Covington, M., Sahita, R.: Capturing Information Flow with Concatenated Dynamic Taint Analysis. In: Proc. of ARES, pp. 355\u2013362 (2009)","DOI":"10.1109\/ARES.2009.56"},{"key":"21_CR25","unstructured":"Kontaxis, G., Polychronakis, M., Keromytis, A.D., Markatos, E.P.: Privacy-preserving social plugins. In: Proceedings of the 21st USENIX Security Symposium (August 2012)"},{"key":"21_CR26","unstructured":"Krohn, M., Yip, A., Brodsky, M., Morris, R., Walfish, M.: A World Wide Web Without Walls. In: Proc. of HotNets (2007)"},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Krohn, M., Yip, A., Brodsky, M., Cliffer, N., Frans, M., Eddie, K., Morris, K.R.: Information Flow Control for Standard OS Abstractions. In: Proc. of SOSP, pp. 321\u2013334 (2007)","DOI":"10.1145\/1323293.1294293"},{"key":"21_CR28","doi-asserted-by":"crossref","unstructured":"Luk, C.K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation. In: Proc. of PLDI, pp. 190\u2013200 (2005)","DOI":"10.1145\/1064978.1065034"},{"key":"21_CR29","unstructured":"Mundada, Y., Ramachandran, A., Feamster, N.: SilverLine: Data and Network Isolation for Cloud Services. In: Proc. of HotCloud (2011)"},{"key":"21_CR30","doi-asserted-by":"crossref","unstructured":"Nethercote, N., Seward, J.: How to Shadow Every Byte of Memory Used by a Program. In: Proc. of VEE, pp. 65\u201374 (2007)","DOI":"10.1145\/1254810.1254820"},{"key":"21_CR31","unstructured":"Newsome, J., Song, D.: Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In: Proc. of NDSS (2005)"},{"key":"21_CR32","doi-asserted-by":"crossref","unstructured":"Portokalidis, G., Slowinska, A., Bos, H.: Argos: an Emulator for Fingerprinting Zero-Day Attacks. In: Proc. of EuroSys, pp. 15\u201327 (2006)","DOI":"10.1145\/1218063.1217938"},{"key":"21_CR33","doi-asserted-by":"crossref","unstructured":"Preibusch, S.: Information Flow Control for Static Enforcement of User-Defined Privacy Policies. In: Proc. of POLICY, pp. 157\u2013160 (2011)","DOI":"10.1109\/POLICY.2011.23"},{"key":"21_CR34","doi-asserted-by":"crossref","unstructured":"Qin, F., Wang, C., Li, Z., Kim, H.S., Zhou, Y., Wu, Y.: LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks. In: Proc. of MICRO, pp. 135\u2013148 (2006)","DOI":"10.1109\/MICRO.2006.29"},{"key":"21_CR35","doi-asserted-by":"crossref","unstructured":"Zhao, Q., Bruening, D., Amarasinghe, S.: Efficient Memory Shadowing for 64-bit Architectures. In: Proc. of ISMM, pp. 93\u2013102 (2010)","DOI":"10.1145\/1806651.1806667"},{"key":"21_CR36","doi-asserted-by":"crossref","unstructured":"Zhao, Q., Bruening, D., Amarasinghe, S.: Umbra: Efficient and Scalable Memory Shadowing. In: Proc. of CGO, pp. 22\u201331 (2010)","DOI":"10.1145\/1772954.1772960"},{"key":"21_CR37","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Compute Clouds. In: Proc. of CCS, pp. 199\u2013212 (2009)","DOI":"10.1145\/1653662.1653687"},{"key":"21_CR38","unstructured":"Santos, N., Gummadi, K.P., Rodrigues, R.: Towards Trusted Cloud Computing. In: Proc. of HotCloud (2009)"},{"key":"21_CR39","doi-asserted-by":"crossref","unstructured":"Slowinska, A., Bos, H.: Pointless Tainting? Evaluating the Practicality of Pointer Tainting. In: Proc. of EuroSys, pp. 61\u201374 (2008)","DOI":"10.1145\/1519065.1519073"},{"key":"21_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-89862-7_1","volume-title":"Information Systems Security","author":"D. Song","year":"2008","unstructured":"Song, D., Brumley, D., Yin, H., Caballero, J., Jager, I., Kang, M.G., Liang, Z., Newsome, J., Poosankam, P., Saxena, P.: BitBlaze: A New Approach to Computer Security via Binary Analysis. In: Sekar, R., Pujari, A.K. (eds.) ICISS 2008. LNCS, vol.\u00a05352, pp. 1\u201325. Springer, Heidelberg (2008)"},{"key":"21_CR41","unstructured":"Sophos: Groupon subsidiary leaks 300k logins, fixes fail, fails again (June 2011), http:\/\/nakedsecurity.sophos.com\/2011\/06\/30\/groupon-subsidiary-leaks-300k-logins-fixes-fail-fails-again\/"},{"key":"21_CR42","unstructured":"The Wall Street Journal: Google Discloses Privacy Glitch (March 2009), http:\/\/blogs.wsj.com\/digits\/2009\/03\/08\/1214\/"},{"key":"21_CR43","doi-asserted-by":"crossref","unstructured":"Wang, W., Li, Z., Owens, R., Bhargava, B.: Secure and Efficient Access to Outsourced Data. In: Proc. of CCSW, pp. 55\u201366 (2009)","DOI":"10.1145\/1655008.1655016"},{"key":"21_CR44","doi-asserted-by":"crossref","unstructured":"Yin, H., Song, D., Egele, M., Kruegel, C., Kirda, E.: Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. In: Proc. of CCS, pp. 116\u2013127 (2007)","DOI":"10.1145\/1315245.1315261"},{"key":"21_CR45","doi-asserted-by":"crossref","unstructured":"Yip, A., Wang, X., Zeldovich, N., Kaashoek, M.F.: Improving Application Security with Data Flow Assertions. In: Proc. of SOSP, pp. 291\u2013304 (2009)","DOI":"10.1145\/1629575.1629604"},{"key":"21_CR46","doi-asserted-by":"crossref","unstructured":"Zavou, A., Pappas, V., Kemerlis, V.P., Polychronakis, M., Portokalidis, G., Keromytis, A.D.: Cloudopsy: An Autopsy of Data Flows in the Cloud. In: Marinos, L., Askoxylakis, I. (eds.) HAS\/HCII 2013. LNCS, vol.\u00a08030, pp. 366\u2013375. Springer, Heidelberg (2013)","DOI":"10.1007\/978-3-642-39345-7_39"},{"key":"21_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-642-25141-2_8","volume-title":"Advances in Information and Computer Security","author":"A. Zavou","year":"2011","unstructured":"Zavou, A., Portokalidis, G., Keromytis, A.D.: Taint-Exchange: a Generic System for Cross-process and Cross-host Taint Tracking. In: Iwata, T., Nishigaki, M. (eds.) IWSEC 2011. LNCS, vol.\u00a07038, pp. 113\u2013128. Springer, Heidelberg (2011)"},{"key":"21_CR48","unstructured":"Zeldovich, N., Boyd-Wickizer, S., Kohler, E., Mazi\u00e8res, D.: Making Information Flow Explicit in HiStar. In: Proc. of OSDI (2006)"},{"key":"21_CR49","unstructured":"Zeldovich, N., Boyd-Wickizer, S., Mazi\u00e8res, D.: Securing Distributed Systems with Information Flow Control. In: Proc. of NSDI, pp. 293\u2013308 (2008)"},{"key":"21_CR50","doi-asserted-by":"crossref","unstructured":"Zhang, Q., McCullough, J., Ma, J., Schear, N., Vrable, M., Vahdat, A., Snoeren, A.C., Voelker, G.M., Savage, S.: Neon: System Support for Derived Data Management. In: Proc. of VEE, pp. 63\u201374 (2010)","DOI":"10.1145\/1837854.1736008"},{"issue":"1","key":"21_CR51","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1145\/1945023.1945039","volume":"45","author":"D. Zhu","year":"2011","unstructured":"Zhu, D., Jung, J., Song, D., Kohno, T., Wetherall, D.: TaintEraser: Protecting Sensitive Data Leaks Using Application-Level Taint Tracking. ACM Operating Systems Review\u00a045(1), 142\u2013154 (2011)","journal-title":"ACM Operating Systems Review"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41284-4_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T17:53:21Z","timestamp":1746035601000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41284-4_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642412837","9783642412844"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41284-4_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}