Binary and Malware Analysis

Table of Contents

Taint analysis in practice

What to taint:

How to propagate taint;

How to use taint