swMATH ID: 31722
Software Authors: Clause, J., Li, W., Orso, A.
Description: Dytan: a generic dynamic taint analysis framework. Dynamic taint analysis is gaining momentum. Techniques based on dynamic tainting have been successfully used in the context of application security, and now their use is also being explored in different areas, such as program understanding, software testing, and debugging. Unfortunately, most existing approaches for dynamic tainting are defined in an ad-hoc manner, which makes it difficult to extend them, experiment with them, and adapt them to new contexts. Moreover, most existing approaches are focused on data-flow based tainting only and do not consider tainting due to control flow, which limits their applicability outside the security domain. To address these limitations and foster experimentation with dynamic tainting techniques, we defined and developed a general framework for dynamic tainting that (1) is highly flexible and customizable, (2) allows for performing both data-flow and control-flow based tainting conservatively, and (3) does not rely on any customized run-time system. We also present DYTAN, an implementation of our framework that works on x86 executables, and a set of preliminary studies that show how DYTAN can be used to implement different tainting-based approaches with limited effort. In the studies, we also show that DYTAN can be used on real software, by using FIREFOX as one of our subjects, and illustrate how the specific characteristics of the tainting approach used can affect efficiency and accuracy of the taint analysis, which further justifies the use of our framework to experiment with different variants of an approach.
Homepage: https://dl.acm.org/doi/10.1145/1273463.1273490
Related Software: TAJ; TaintDroid; Panorama; BitBlaze; FlowDroid; F4F; Pixy; Valgrind; Saner; LIFT; Apache Flink; MorphDroid; Aletheia; Sails; BackFlow; Julia Static Analyzer; JFlow; VOT4CS; pyftpdlib; DynOpVm
Cited in: 5 Publications

Cited in 0 Serials

Citations by Year