Posts in General
Page Content
About: Secure Program Execution via Dynamic Information Flow Tracking
Suh et al. (2004) propose a wonderful method for tracking taintedness, and denying dangerous operations. It's elegant, easy to understand, cheap in terms of performance hit, and effective. The only problem is... it would require re-designing the hardware (CPUs) to support it.
I wish it would happen, but I'm not holding my breath. Perhaps virtual machines could help until it happens, and even make it happen?
Elisa’s dead
No, not our esteemed director of research. It turned off my ELISA project, Enterprise-Level Information Security Assurance, due to lack of interest from the public at large. The idea for this web application was to keep track of patches and basically support NIST's recommendation on managing patches to use such a system. I believe this indicates that the process was too heavy; people don't like to spend so much effort and money managing patches.


