COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Computer Laboratory Systems Research Group Seminar > Pointless Tainting? Evaluating the practicality of pointer tainting
Pointless Tainting? Evaluating the practicality of pointer taintingAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Eiko Yoneki. This talk evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT). Pointer tainting has been used for two main purposes: detection of privacy-breaching malware (e.g., trojan keyloggers obtaining the characters typed by a user), and detection of memory corruption attacks against non-control data (e.g., a buffer over?ow that modi?es a user’s privilege level). The technique is considered one of the only methods for detecting them in unmodi?ed binaries. Unfortunately, almost all of the incarnations of pointer tainting are ?awed. We found that pointer tainting generates itself the conditions for false positives. We analyse the problems in detail and investigate various ways to improve the technique. Most have serious drawbacks in that they are either impractical (and incur many false pos- itives still), and/or cripple the technique’s ability to detect attacks. We argue that depending on architecture and operating system, pointer tainting may have some value in detecting memory corruption attacks (albeit with false negatives and not on the popular x86 architecture), but it is not suitable for automated detecting of privacy-breaching malware such as keyloggers. Bio: Asia Slowinska is a third-year PhD student at the Vrije Universiteit Amsterdam. Her research concerns intrusion detection, signature generation, and honeypots. Currently she’s interning with MSRC . This talk is part of the Computer Laboratory Systems Research Group Seminar series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsCambridge University Russian Society Talks C.U. Ethics in Mathematics Society (CUEiMS) Type the title of a new list hereOther talksHow to rediscover a medical secret in eighteenth-century France: the lost recipe of the Chevalier de Guiller's powder febrifuge Behavioural phenotypes of children born preterm: what we know and future research avenues Eukaryotic cell division and its origins Aromatic foldamers: mastering molecular shape Malaria’s Time Keeping Mathematical applications of little string theory The ‘Easy’ and ‘Hard’ Problems of Consciousness Computing High Resolution Health(care) Statistical Methods in Pre- and Clinical Drug Development: Tumour Growth-Inhibition Model Example Horizontal transfer of antimicrobial resistance drives multi-species population level epidemics CANCELLED in solidarity with strike action: Permanent Sovereignty over Natural Resources and the Unsettling of Mainstream Narratives of International Legal History |