[1] Newsome J, Song D. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software[C]//Proc. of the 12th Annual Network and Distributed System Security Symposium. San Diego, USA: [s. n.], 2005.
[2] Zhu Yu, Jung J, Song D, et al. Privacy Scope: A Precise Infor- mation Flow Tracking System for Finding Application Leaks[R]. Berkeley, USA: University of California, Tech. Rep.: UCB/EECS- 2009-145, 2009.
[3] Schwartz E J, Avgerinos T, Brumley D. All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution[C]//Proc. of IEEE Symposium on Security and Privacy. Oakland, USA: IEEE Computer Society Press, 2010.
[4] Clause J, Li Wanchun, Orso A. Dytan: A Generic Dynamic Taint Analysis Framework[C]//Proc. of the International Symposium on Software Testing and Analysis. London, UK: ACM Press, 2007.
[5] Bao Tao, Zheng Yunhui, Lin Zhiqiang, et al. Strict Control Dependence and Its Effect on Dynamic Information Flow Analyses[C]//Proc. of the 9th International Symposium on Software Testing and Analysis. Trento, USA: ACM Press, 2010.
[6] Kang M G, McCamant S, Poosankam P, et al. DTA++: Dynamic Taint Analysis with Targeted Control——Flow Propagation[C]// Proc. of the 18th Annual Network and Distributed System Security Symposium. San Diego, USA: [s. n.], 2011.
[7] Appel A W. Modern Compiler Implementation in C[M]. Cambridge, UK: Cambridge University Press, 2004.
[8] Nethercote N, Seward J. Valgrind: A Framework for Heavyweight Dynamic Binary Instrumentation[C]//Proc. of ACM SIGPLAN Conference on Programming Language Design and Implemen- tation. New York, USA: ACM Press, 2007. |