Show simple item record

dc.contributor.authorSuh, G. Edward
dc.contributor.authorLee, Jaewook
dc.contributor.authorZhang, David
dc.contributor.authorDevadas, Srinivas
dc.contributor.otherComputation Structures
dc.date.accessioned2005-12-19T22:06:13Z
dc.date.available2005-12-19T22:06:13Z
dc.date.issued2003-07-21
dc.identifier.otherMIT-CSAIL-TR-2003-004
dc.identifier.otherMIT-LCS-TR-912
dc.identifier.urihttp://hdl.handle.net/1721.1/30396
dc.description.abstractWe present a simple architectural mechanism called dynamicinformation flow tracking that can significantly improve thesecurity of computing systems with negligible performanceoverhead. Dynamic information flow tracking protects programs against malicious software attacks by identifying spurious information flows from untrusted I/O and restrictingthe usage of the spurious information.Every security attack to take control of a program needsto transfer the programÂ’s control to malevolent code. Inour approach, the operating system identifies a set of inputchannels as spurious, and the processor tracks all information flows from those inputs. A broad range of attacks areeffectively defeated by checking the use of the spurious values as instructions and pointers.Our protection is transparent to users or application programmers; the executables can be used without any modification. Also, our scheme only incurs, on average, a memoryoverhead of 1.4% and a performance overhead of 1.1%.
dc.format.extent12 p.
dc.format.extent23224161 bytes
dc.format.extent957525 bytes
dc.format.mimetypeapplication/postscript
dc.format.mimetypeapplication/pdf
dc.language.isoen_US
dc.relation.ispartofseriesMassachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory
dc.titleSecure Program Execution Via Dynamic Information Flow Tracking


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record