-
3
-
-
0027963879
-
Efficient detection of all pointer and array access errors
-
Orlando, FL, June
-
T. Austin, S. Breach, and G. Sohi. Efficient detection of all pointer and array access errors. In ACM SIGPLAN Conf. on Programming Language Design and Implementation, pp. 290-201, Orlando, FL, June 1994.
-
(1994)
ACM SIGPLAN Conf. on Programming Language Design and Implementation
, pp. 290-201
-
-
Austin, T.1
Breach, S.2
Sohi, G.3
-
5
-
-
0034448902
-
ABCD: Eliminating array bounds checks on demand
-
Vancouver, BC, June
-
R. Bodik, R. Gupta, and V. Sarkar. ABCD: Eliminating array bounds checks on demand. In ACM SIGPLAN Conf. on Programming Language Design and Implementation, pp. 321-333, Vancouver, BC, June 2000.
-
(2000)
ACM SIGPLAN Conf. on Programming Language Design and Implementation
, pp. 321-333
-
-
Bodik, R.1
Gupta, R.2
Sarkar, V.3
-
6
-
-
0033688092
-
A static analyazer for finding dynamic programming errors
-
June
-
W. Bush, J. Pincus, and D. Sielaff. A static analyazer for finding dynamic programming errors. Software-Practice and Experience, 30(7):775-802, June 2000.
-
(2000)
Software-practice and Experience
, vol.30
, Issue.7
, pp. 775-802
-
-
Bush, W.1
Pincus, J.2
Sielaff, D.3
-
8
-
-
33744702336
-
-
Ckit. http://www.smlnj.org/doc/ckit/
-
-
-
-
9
-
-
1442288707
-
CCured in the real world
-
San Diego, CA, June
-
J. Condit, M. Harren, S. McPeak, G. Necula, and W. Weimer. CCured in the real world. In ACM SIGPLAN Conf. on Programming Language Design and Implementation, pp. 232-244, San Diego, CA, June 2003.
-
(2003)
ACM SIGPLAN Conf. on Programming Language Design and Implementation
, pp. 232-244
-
-
Condit, J.1
Harren, M.2
McPeak, S.3
Necula, G.4
Weimer, W.5
-
10
-
-
85084160243
-
Automatic detection and prevention of buffer-overflow attacks
-
San Antonio, TX, Jan.
-
C. Cowan, C. Pu, D. Maier, H. Hinton, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. Automatic detection and prevention of buffer-overflow attacks. In 7th USENIX Security Symposium, San Antonio, TX, Jan. 1998.
-
(1998)
7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
12
-
-
0004207324
-
Extended static checking
-
Compaq SRC
-
D. L. Detlefs, K. R. M. Leino, G. Nelson, and J. B. Saxe. Extended static checking. Tech. Report SRC-159, Compaq SRC, 1998.
-
(1998)
Tech. Report
, vol.SRC-159
-
-
Detlefs, D.L.1
Leino, K.R.M.2
Nelson, G.3
Saxe, J.B.4
-
13
-
-
84890090975
-
Cleanness checking of string manipulations in C programs via integer analysis
-
Springer, July
-
N. Dor, M. Roden, and M. Sagiv. Cleanness checking of string manipulations in C programs via integer analysis. In The 8th International Static Analysis Symposium, volume 2126 of Lecture Notes in Computer Science, page 194. Springer, July 2001.
-
(2001)
The 8th International Static Analysis Symposium, Volume 2126 of Lecture Notes in Computer Science
, vol.2126
, pp. 194
-
-
Dor, N.1
Roden, M.2
Sagiv, M.3
-
15
-
-
0027568719
-
Optimizing array bound checks using flow analysis
-
Mar.-Dec.
-
R. Gupta. Optimizing array bound checks using flow analysis. ACM Letters on Programming Languages and Systems, 2(1-4):135-150, Mar.-Dec. 1993.
-
(1993)
ACM Letters on Programming Languages and Systems
, vol.2
, Issue.1-4
, pp. 135-150
-
-
Gupta, R.1
-
17
-
-
85084164164
-
Cyclone: A safe dialect of C
-
Monterey, CA, June
-
T. Jim, G. Morrisett, D. Grossman, M. Hicks, J. Cheney, and Y. Wang. Cyclone: A safe dialect of C. In USENIX Annual Technical Conference, Monterey, CA, June 2002.
-
(2002)
USENIX Annual Technical Conference
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
20
-
-
84944192977
-
Debugging via run-time type checking
-
Springer, Apr.
-
A. Loginov, S. Yong, S. Horwitz, and T. Reps. Debugging via run-time type checking. In Fundamental Approaches to Software Engineering, volume 2029 of Lecture Notes in Computer Science, pp. 217-232. Springer, Apr. 2001.
-
(2001)
Fundamental Approaches to Software Engineering, Volume 2029 of Lecture Notes in Computer Science
, pp. 217-232
-
-
Loginov, A.1
Yong, S.2
Horwitz, S.3
Reps, T.4
-
21
-
-
1542295484
-
Elimination of Java array bounds checks in the presence of indirection
-
Department of Computer Science, University of Manchester, Feb.
-
M. Lujan, J. R. Gurd, T. L. Freeman, and J. Miguel. Elimination of Java array bounds checks in the presence of indirection. Tech. Report CSPP-13, Department of Computer Science, University of Manchester, Feb. 2002.
-
(2002)
Tech. Report
, vol.CSPP-13
-
-
Lujan, M.1
Gurd, J.R.2
Freeman, T.L.3
Miguel, J.4
-
22
-
-
84976671430
-
Optimization of range checking
-
Boston, MA, June
-
V. Markstein, J. Cocke, and P. Markstein. Optimization of range checking. In ACM SIGPLAN Symposium on Compiler Construction, SIGPLAN Notices 17(6), pp. 114-119, Boston, MA, June 1982.
-
(1982)
ACM SIGPLAN Symposium on Compiler Construction, SIGPLAN Notices
, vol.17
, Issue.6
, pp. 114-119
-
-
Markstein, V.1
Cocke, J.2
Markstein, P.3
-
23
-
-
0036040304
-
CCured: Type-safe retrofitting of legacy code
-
Portland, OR, Jan.
-
G. Necula, S. McPeak, and W. Weimer. CCured: Type-safe retrofitting of legacy code. In ACM Symp. on Principles of Programming Languages, Portland, OR, Jan. 2002.
-
(2002)
ACM Symp. on Principles of Programming Languages
-
-
Necula, G.1
McPeak, S.2
Weimer, W.3
-
25
-
-
33744610327
-
-
Packet storm. http://packetstormsecurity.org/
-
-
-
-
27
-
-
0030836322
-
Low-cost, concurrent checking of pointer and array accesses in C programs
-
Jan.
-
H. Patil and C. Fischer. Low-cost, concurrent checking of pointer and array accesses in C programs. Software-Practice and Experience, 27(1):87-110, Jan. 1997.
-
(1997)
Software-practice and Experience
, vol.27
, Issue.1
, pp. 87-110
-
-
Patil, H.1
Fischer, C.2
-
29
-
-
1542265549
-
Stack smashing vulnerabilities in the UNIX operating system
-
Computer Science Department, Southern Connecticut State University
-
N. P. Smith. Stack smashing vulnerabilities in the UNIX operating system. Technical report, Computer Science Department, Southern Connecticut State University, 1997.
-
(1997)
Technical Report
-
-
Smith, N.P.1
-
30
-
-
33744675360
-
-
Immunix Stack Guard. http://immunix.org/stackguard.html
-
-
-
-
31
-
-
33744666243
-
-
Stack Shield. http://www.angelfire.com/sk/stackshield/
-
-
-
-
33
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
San Diego, CA, Feb.
-
D. Wagner, J. Foster, E. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Symp. on Network and Distributed Systems Security, pp. 3-17, San Diego, CA, Feb. 2000.
-
(2000)
Symp. on Network and Distributed Systems Security
, pp. 3-17
-
-
Wagner, D.1
Foster, J.2
Brewer, E.3
Aiken, A.4
-
35
-
-
0032660031
-
Pointer analysis for programs with structures and casting
-
Atlanta, GA, May
-
S. Yong, S. Horwitz, and T. Reps. Pointer analysis for programs with structures and casting. In ACM SIGPLAN Conf. on Programming Language Design and Implementation, pp. 91-103, Atlanta, GA, May 1999.
-
(1999)
ACM SIGPLAN Conf. on Programming Language Design and Implementation
, pp. 91-103
-
-
Yong, S.1
Horwitz, S.2
Reps, T.3
|