메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 144-157

SAFECode: Enforcing alias analysis for weakly typed languages

Author keywords

Alias analysis; Automatic pool allocation; Compilers; Programming languages; Region management

Indexed keywords

ALIAS ANALYSIS; AUTOMATIC POOL ALLOCATION; REGION MANAGEMENT; RUN-TIME CHECKS;

EID: 33746057447     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1133255.1133999     Document Type: Conference Paper
Times cited : (93)

References (41)
  • 6
    • 0033729897 scopus 로고    scopus 로고
    • The real-time specification for Java
    • G. Bollella and J. Gosling. The real-time specification for Java. IEEE Computer, 33(6):47-54, 2000.
    • (2000) IEEE Computer , vol.33 , Issue.6 , pp. 47-54
    • Bollella, G.1    Gosling, J.2
  • 11
    • 34247170052 scopus 로고    scopus 로고
    • Backwards-compatible array bounds checking for C with very low overhead
    • Shanghai, China, May
    • D. Dhurjali and V. Adve. Backwards-compatible array bounds checking for C with very low overhead. In Proc. 28th Int'l Conf. on Software Engineering (ICSE), Shanghai, China, May 2006.
    • (2006) Proc. 28th Int'l Conf. on Software Engineering (ICSE)
    • Dhurjali, D.1    Adve, V.2
  • 13
    • 84858903147 scopus 로고    scopus 로고
    • Enforcing alias analysis for weakly typed languages
    • Computer Science Dept., Univ. of Illinois at Urbana-Champaign, Oct
    • D. Dhurjati, S. Kowshik, and V. Adve. Enforcing alias analysis for weakly typed languages. Tech Report UIUCDCS-R-2005-2657, Computer Science Dept., Univ. of Illinois at Urbana-Champaign, Oct 2005. See http://safecode.ca.uiuc.edu/.
    • (2005) Tech Report , vol.UIUCDCS-R-2005-2657
    • Dhurjati, D.1    Kowshik, S.2    Adve, V.3
  • 23
    • 0000596666 scopus 로고
    • Purify: Fast detection of memory leaks and access errors
    • R. Hastings and B. Joyce. Purify: Fast detection of memory leaks and access errors. In Winter USENIX, 1992.
    • (1992) Winter USENIX
    • Hastings, R.1    Joyce, B.2
  • 27
    • 0012582509 scopus 로고    scopus 로고
    • Backwards-compatible bounds checking for arrays and pointers in c programs
    • R. W. M. Jones and P. H. J. Kelly. Backwards-compatible bounds checking for arrays and pointers in c programs. In Automated and Algorithmic Debugging, pages 13-26, 1997.
    • (1997) Automated and Algorithmic Debugging , pp. 13-26
    • Jones, R.W.M.1    Kelly, P.H.J.2
  • 34
  • 40
    • 1542317050 scopus 로고    scopus 로고
    • Archer: Using symbolic, path-sensitive analysis to detect memory access errors
    • Y. Xie, A. Chou, and D. Engler. Archer: using symbolic, path-sensitive analysis to detect memory access errors. SIGSOFT Softw. Eng. Notes, 28(5):327-336, 2003.
    • (2003) SIGSOFT Softw. Eng. Notes , vol.28 , Issue.5 , pp. 327-336
    • Xie, Y.1    Chou, A.2    Engler, D.3
  • 41
    • 77954512971 scopus 로고    scopus 로고
    • Protecting C programs from attacks via invalid pointer dereferences
    • S. H. Yong and S. Horwitz. Protecting C programs from attacks via invalid pointer dereferences. In Foundations of Software Engineering, 2003.
    • (2003) Foundations of Software Engineering
    • Yong, S.H.1    Horwitz, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.