This document discusses information flow control and taint tracking as techniques for detecting malware. It describes Denning's lattice model for mandatory access control and how taint tracking works by marking and propagating tainted data through a system. Taint graphs are generated to show information flows, which can then be used to detect anomalous behavior and categorize unknown programs as malicious or benign. The approach was able to detect all tested malware samples with few false positives. Performance overhead and evasive malware are identified as weaknesses.