{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:33:42Z","timestamp":1729654422214,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/scam.2015.7335407","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T17:49:26Z","timestamp":1448300966000},"page":"111-120","source":"Crossref","is-referenced-by-count":1,"title":["Data tainting and obfuscation: Improving plausibility of incorrect taint"],"prefix":"10.1109","author":[{"given":"Sandrine","family":"Blazy","sequence":"first","affiliation":[]},{"given":"Stephanie","family":"Riaud","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Sirvent","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref38","article-title":"GCC, the gnu compiler collection"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SERE-C.2014.33"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/978-3-540-70542-0_8","article-title":"On the limits of information flow techniques for malware analysis and containment","volume":"5137","author":"cavallaro","year":"2008","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"ref31","article-title":"Anti-taint-analysis: Practical evasion techniques against information flow based malware defense","author":"cavallaro","year":"2007","journal-title":"Stony Brook Computer Science Dept Tech Rep"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-89862-7_1","article-title":"BitBlaze: A new approach to computer security via binary analysis","author":"song","year":"2008","journal-title":"Proceedings of the 4th International Conference on Information Systems Security"},{"year":"0","key":"ref37","article-title":"IDA, the multi-processor disassembler and debugger"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557577"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2014.43"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831711"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831711"},{"key":"ref11","first-page":"148","article-title":"A taxonomy of obfuscating transformations","author":"collberg","year":"1997","journal-title":"University of Auckland Department of Computer Science Tech Rep"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.13"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2010.28"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)81042-9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"ref16","first-page":"24","article-title":"Static and dynamic analysis: Synergy and duality","author":"ernst","year":"2003","journal-title":"WODA 2003 ICSE Workshop on Dynamic Analysis"},{"key":"ref17","article-title":"Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software","author":"newsome","year":"2005","journal-title":"Proceedings of the Network and Distributed System Security Symposium NDSS 2005"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420981"},{"key":"ref19","first-page":"63","article-title":"Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks","author":"cowan","year":"1998","journal-title":"The Proceedings of the 7th USENIX Security Symposium"},{"key":"ref28","article-title":"Taint nobody got time for crash analysis","author":"richard","year":"2013","journal-title":"REcon Computer Security Conference on Reverse Engineering and Advanced Exploitation Techniques"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2004.17"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1065887.1065892"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180445"},{"key":"ref6","article-title":"Crash analysis with BitBlaze","author":"miller","year":"2010","journal-title":"BlackHat 2010 Las Vegas NV July 2010"},{"key":"ref29","first-page":"116","article-title":"Panorama: Capturing system-wide information flow for malware detection and analysis","author":"yin","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-014-0203-1"},{"key":"ref8","article-title":"TEMU: Binary code analysis via whole-system layered annotative execution","author":"yin","year":"2010","journal-title":"EECS Department University of California Berkeley Tech Rep UCB\/EECS-2009-28"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"key":"ref2","first-page":"209","article-title":"Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs","author":"cadar","year":"2008","journal-title":"Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"ref1","article-title":"Coverage maximization using dynamic taint tracing","author":"leek","year":"2007","journal-title":"MIT Lincoln Laboratory Tech Rep TR-1112"},{"key":"ref20","first-page":"255","article-title":"Backwards-compatible bounds checking for arrays and pointers in C programs","author":"jones","year":"1997","journal-title":"Distributed Enterprise Applications HP Labs Tech Report"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.26"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1037947.1024404"},{"key":"ref24","first-page":"22","article-title":"Un-derstanding data lifetime via whole system simulation","volume":"13","author":"chow","year":"2004","journal-title":"Proceedings of the 13th Conference on USENIX Security Symposium -"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70748"},{"key":"ref26","first-page":"135","article-title":"Lift: A low-overhead practical information flow tracking system for detecting security attacks","author":"qin","year":"2006","journal-title":"Proceedings of the 39th Annual IEEE\/ACM International Symposium on Microarchitecture"},{"key":"ref25","first-page":"1","article-title":"Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones","author":"enck","year":"2010","journal-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation"}],"event":{"name":"2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)","start":{"date-parts":[[2015,9,27]]},"location":"Bremen, Germany","end":{"date-parts":[[2015,9,28]]}},"container-title":["2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7321933\/7335391\/07335407.pdf?arnumber=7335407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T20:14:41Z","timestamp":1498248881000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335407\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/scam.2015.7335407","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}