Taint

Results: 199



#Item
11Android / Cross-platform software / Java virtual machine / Java platform / Object-oriented programming languages / Dalvik / Java Native Interface / Java / Taint / VA / Loadable kernel module

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones William Enck The Pennsylvania State University Landon P. Cox Duke University

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2010-10-01 12:15:47
12Wine / Packaging / Oenology / Screw cap / Threading / Alternative wine closure / Closure / Cork taint / Aging of wine / Cork / Pinot noir / Bottling line

1333 Mornington-Flinders Road :: Main Ridge :: Victoria :: 3928 Office TFRestaurant :: Tractor Wine Bar :: Cellar Door Twww.tenminutesbytractor.com.au

Add to Reading List

Source URL: www.tenminutesbytractor.com.au

Language: English - Date: 2011-04-20 05:59:19
13Andrology / Medicine / Castration / Male genital modification / Sexual abuse / Violence against men / Clinical medicine / Pig farming / Boar taint / Human reproduction / Domestic pig / Pig

FEDERATION OF VETERINARIANS OF EUROPE SUMMARY REPORT FVE SURVEY ON PIG CASTRATION The Federation of Veterinarians of Europe (FVE) carried out in November 2015 a survey on pig

Add to Reading List

Source URL: www.fve.org

Language: English
14

Type-based Taint Analysis for Java Web Applications Technical Report Wei Huang, Yao Dong, and Ana Milanova Rensselaer Polytechnic Institute January 19, 2014

Add to Reading List

Source URL: www.cs.rpi.edu

Language: English - Date: 2014-08-26 07:39:28
    15

    Type-based Taint Analysis for Java Web Applications Wei Huang, Yao Dong, and Ana Milanova Rensselaer Polytechnic Institute Abstract. Static taint analysis detects information flow vulnerabilities.

    Add to Reading List

    Source URL: www.cs.rpi.edu

    Language: English - Date: 2014-08-26 07:38:37
      16

      1 Implementing Erasure Policies Using Taint Analysis Filippo Del Tedesco, Alejandro Russo, and David Sands Chalmers University of Technology, G¨oteborg, Sweden

      Add to Reading List

      Source URL: www.cse.chalmers.se

      Language: English - Date: 2010-09-01 07:44:06
        17

        Scalable and Precise Taint Analysis for Android Wei Huang Yao Dong Ana Milanova Google

        Add to Reading List

        Source URL: www.cs.rpi.edu

        Language: English - Date: 2015-03-19 07:25:04
          18

          All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask) Edward J. Schwartz, Thanassis Avgerinos, David Brumley Carnegie Mellon University Pittsburgh, PA

          Add to Reading List

          Source URL: users.ece.cmu.edu

          Language: English - Date: 2014-12-17 15:18:11
            19

            Automatic Inference of Search Patterns for Taint-Style Vulnerabilities Fabian Yamaguchi, Alwin Maier, Hugo Gascon, and Konrad Rieck University of G¨ottingen, Germany Abstract—Taint-style vulnerabilities are a persist

            Add to Reading List

            Source URL: user.informatik.uni-goettingen.de

            Language: English - Date: 2015-05-07 10:13:05
              20

              15 Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution TIELEI WANG and TAO WEI, Peking University GUOFEI GU, Texas A&M University WEI ZOU, Peking University

              Add to Reading List

              Source URL: faculty.cs.tamu.edu

              Language: English - Date: 2011-11-06 10:29:37
                UPDATE