作者: Kevin W. Hamlen , Frederico Araujo
DOI:
关键词:
摘要: An enhanced dynamic taint-tracking semantics is presented and implemented, facilitating fast precise runtime secret redaction from legacy processes, such as those compiled C/C++. The reduce the annotation burden imposed upon developers seeking to add secret-redaction capabilities code, while curtailing over-tainting label creep. An implementation for LLVM's DataFlow Sanitizer automatically instruments support into annotated C/C++ programs at compile-time, yielding that can self-censor their address spaces in response emerging cyber-attacks. technology applied produce first information flow-based honey-patching architecture Apache web server. Rather than merely blocking intrusions, modified server deceptively diverts attacker connections secret-sanitized process clones monitor activities disinform adversaries with honey-data.