Groups | Search | Server Info | Login | Register
Groups > comp.compilers > #139
| From | glen herrmannsfeldt <gah@ugcs.caltech.edu> |
|---|---|
| Newsgroups | comp.compilers |
| Subject | Re: Dealing with load/store instructions on static tainted flow analysis |
| Date | 2011-06-07 09:04 +0000 |
| Organization | A noiseless patient Spider |
| Message-ID | <11-06-013@comp.compilers> (permalink) |
| References | <11-06-010@comp.compilers> |
Gabriel Quadros <gabrielquadros@hotmail.com> wrote: > I am trying to implement a pass to detect information leak in > programs. The problem is a variation of static tainted-flow analysis: > I have some source functions, sink functions and sanitizers. I want to > know if it is possible for data to flow from source to sink without > going across a sanitizer. (snip) > In particular, if you could point me some paper that does it, > that would be great. It isn't exactly the same, but I would start looking at the Java class verifier. Well, for one Java requires bounds checking, so you can be sure that only references to the same array would leak. Java also requires the verifier to detect references that load/store the wrong data type, such as treating a double as two ints. (I believe it detects both stack and heap accesses.) -- glen
Back to comp.compilers | Previous | Next — Previous in thread | Next in thread | Find similar
Dealing with load/store instructions on static tainted flow analysis Gabriel Quadros <gabrielquadros@hotmail.com> - 2011-06-06 21:00 -0700 Re: Dealing with load/store instructions on static tainted flow analysis glen herrmannsfeldt <gah@ugcs.caltech.edu> - 2011-06-07 09:04 +0000 Re: Dealing with load/store instructions on static tainted flow analysis kym@kymhorsell.com - 2011-06-08 07:53 +0000 Re: Dealing with load/store instructions on static tainted flow analysis George Neuner <gneuner2@comcast.net> - 2011-06-09 18:51 -0400 Re: Dealing with load/store instructions on static tainted flow analysis Martin Ward <martin@gkc.org.uk> - 2011-06-12 12:11 +0100
csiph-web