Paper
28 July 2022 A review of auxiliary hardware architectures supporting dynamic taint analysis
Anfeng Yang, Yan Guang, Yuntian Zhao
Author Affiliations +
Proceedings Volume 12303, International Conference on Cloud Computing, Internet of Things, and Computer Applications (CICA 2022); 123031P (2022) https://doi.org/10.1117/12.2642713
Event: International Conference on Cloud Computing, Internet of Things, and Computer Applications, 2022, Luoyang, China
Abstract
Dynamic taint analysis is a widely used information flow analysis method. The software structure supporting dynamic taint analysis needs running program to monitor the spread of taint, which will bring a large running time overhead. The architecture based on hardware implementation can shorten the running time overhead of taint analysis through hardware modification, which has great research significance. Firstly, we introduced the research background and significance of hardware. Then, we describe the problems of providing support structure for dynamic taint analysis based on software and how to solve or alleviate these problems in hardware architecture on the basis of the introduction of the specific classification and structure of hardware architecture. Finally, on the basis of comparing the characteristics of hardware structure from different dimensions, the future research direction of hardware structure is prospected.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Anfeng Yang, Yan Guang, and Yuntian Zhao "A review of auxiliary hardware architectures supporting dynamic taint analysis", Proc. SPIE 12303, International Conference on Cloud Computing, Internet of Things, and Computer Applications (CICA 2022), 123031P (28 July 2022); https://doi.org/10.1117/12.2642713
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer architecture

Pollution

Inspection

Defense and security

Information security

Reliability

Back to Top