Sciweavers

311 search results - page 63 / 63
» Secure Information Flow by Self-Composition
Sort
View
EUROSYS
2009
ACM
14 years 1 months ago
Pointless tainting?: evaluating the practicality of pointer tainting
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Asia Slowinska, Herbert Bos