Pointless Tainting? Evaluating the Practicality of Pointer Tainting

Asia Slowinska - Vrije University, Netherlands
Digital Security

Date: -
Location: Eurecom

This talk evaluates pointer tainting, an incarnation of Dy- namic Information Flow Tracking (DIFT), which has re- cently become an important technique in system security. Pointer tainting has been used for two main purposes: de- tection of privacy-breach