The document describes an approach for detecting illegal memory accesses using dynamic taint analysis. It assigns taint marks to track data from untrusted sources as it propagates through a program. It propagates taint marks at runtime and checks for illegal accesses when data with taint reaches sensitive program points like memory references. The approach operates at the binary level with minimal modifications, avoiding limitations of prior static and dynamic techniques. It outlines assigning taint marks, propagating them, and checking them to detect illegal accesses with an empirical evaluation and conclusions.