作者: Alex Ho , Michael Fetterman , Christopher Clark , Andrew Warfield , Steven Hand
关键词:
摘要: Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of well-known technique, data tainting, to track received from network as it propagates through system and prevent its execution. Unlike past approaches taint tracking, which tainted by running completely in an emulator or simulator, resulting considerable execution overhead, our work ability dynamically switch between virtualized emulated Using this we able explore hardware support for taint-based protection that is deployable real-world situations, emulation only used when being processed CPU. By modifying CPU, memory, I/O devices tracking protection, guarantee may not be executed, even if written to, later read disk. We demonstrate near native speeds workloads where little present.