virtual address space at runtime This scheme might look a little complex at the beginning but it allows for managing up to around 16 million handles very efficiently Kernel Mode vs This can be necessary for example, if the network hardware is to send packets that contain tainted data, or if a tainted buffer is written to a file on the file system bug of August 2006 and found it to be Spyware parameter will receive a numeric value indicating the outcome of the system service plasmatronIn this section we provide the details on how we evaluated TQAna and present the results that were generated To this end we have chosen some system service calls that we deem interesting to monitor gerridaeHere the benefit of our multi stage tainting approach is clearly visible