A Review of Researching on Dynamic Taint Analysis Technique
- DOI
- 10.2991/jimec-18.2018.25How to use a DOI?
- Keywords
- taint analysis; vulnerability detection; information flow tracking; taint propagation
- Abstract
Taint analysis technique is the key technique means for analyzing the robustness of programs and vulnerability mining. By marking the data which are sensitive or untrusted, one can observe the flow of these tainted data during program execution, then determine whether the marked data affects the key nodes of the program. According to the implementation mechanism, the taint analysis can be divided into static taint analysis and dynamic taint analysis. As an auxiliary technique, it can be combined with mainstream vulnerability mining techniques such as fuzzing test and symbol execution, playing a great role in test case construction and path feasibility analysis. This article firstly introduces the basic concepts of dynamic taint analysis technique. Second, it focuses on the process of dynamic taint marking, propagation and detection. Then it summarizes the main defects in taint analysis and the application status of dynamic taint analysis technique. Finally, it is compared with the current mainstream taint analysis tools and explores the future trends of taint analysis technique.
- Copyright
- © 2019, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Peiwu Dai AU - Zulie Pan AU - Yang Li PY - 2018/12 DA - 2018/12 TI - A Review of Researching on Dynamic Taint Analysis Technique BT - Proceedings of the 2018 3rd Joint International Information Technology,Mechanical and Electronic Engineering Conference (JIMEC 2018) PB - Atlantis Press SP - 118 EP - 123 SN - 2589-4943 UR - https://doi.org/10.2991/jimec-18.2018.25 DO - 10.2991/jimec-18.2018.25 ID - Dai2018/12 ER -