메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 158-168

DieHard: Probabilistic memory safety for unsafe languages

Author keywords

DieHard; Dynamic memory allocation; Probabilistic memory safety; Randomization; Replication

Indexed keywords

DIEHARD; DYNAMIC MEMORY ALLOCATION; PROBABILISTIC MEMORY SAFETY; RANDOMIZATION; REPLICATION;

EID: 33746101822     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (235)

References (44)
  • 2
    • 0022252695 scopus 로고
    • The N-version approach to fault-tolerant systems
    • Dec.
    • A. Avizienis. The N-version approach to fault-tolerant systems. IEEE Transactions on Software Engineering, 11(12):1491-1501, Dec. 1985.
    • (1985) IEEE Transactions on Software Engineering , vol.11 , Issue.12 , pp. 1491-1501
    • Avizienis, A.1
  • 4
    • 35048857405 scopus 로고    scopus 로고
    • Parameterized verification of multithreaded software libraries
    • 7th International Conference on Proceedings of Tools and Algorithms for the Construction and Analysis of Systems (TACAS)
    • T. Ball, S. Chaki, and S. K. Rajamuni. Parameterized verification of multithreaded software libraries. In 7th International Conference on Proceedings of Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 2031 of Lecture Notes in Computer Science, pages 158-173, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2031 , pp. 158-173
    • Ball, T.1    Chaki, S.2    Rajamuni, S.K.3
  • 7
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • USENIX, Aug.
    • S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In Proceedings of the 12th USENIX Security Symposium, pages 105-120. USENIX, Aug. 2003.
    • (2003) Proceedings of the 12th USENIX Security Symposium , pp. 105-120
    • Bhatkar, S.1    DuVarney, D.C.2    Sekar, R.3
  • 8
  • 9
    • 0024085322 scopus 로고
    • Garbage collection in an uncooperative environment
    • H.-J. Boehm and M. Weiser. Garbage collection in an uncooperative environment. Software Practice and Experience, 18(9):807-820, 1988.
    • (1988) Software Practice and Experience , vol.18 , Issue.9 , pp. 807-820
    • Boehm, H.-J.1    Weiser, M.2
  • 12
    • 33745210908 scopus 로고
    • Empirical evidence for using garbage collection in C and C++ programs
    • E. Moss, P. R. Wilson, and B. Zorn, editors, Oct.
    • D. L. Detlefs. Empirical evidence for using garbage collection in C and C++ programs. In E. Moss, P. R. Wilson, and B. Zorn, editors, OOPSLA/ECOOP '93 Workshop on Garbage Collection in Object-Oriented Systems, Oct. 1993.
    • (1993) OOPSLA/ECOOP '93 Workshop on Garbage Collection in Object-oriented Systems
    • Detlefs, D.L.1
  • 15
    • 0022045868 scopus 로고
    • Impossibility of distributed consensus with one faulty process
    • M. J. Fischer, N. A. Lynch, and M. S. Paterson. Impossibility of distributed consensus with one faulty process. J. ACM, 32(2):374-382, 1985.
    • (1985) J. ACM , vol.32 , Issue.2 , pp. 374-382
    • Fischer, M.J.1    Lynch, N.A.2    Paterson, M.S.3
  • 17
    • 0027797652 scopus 로고
    • Improving the cache locality of memory allocation
    • Proceedings of SIGPLAN'93 Conference on Programming Languages Design and Implementation, Albuquerque, NM. June. ACM Press
    • D. Grunwald, B. Zorn, and R. Henderson. Improving the cache locality of memory allocation. In Proceedings of SIGPLAN'93 Conference on Programming Languages Design and Implementation, volume 28(6) of ACM SIGPLAN Notices, pages 177-186, Albuquerque, NM. June 1993. ACM Press.
    • (1993) ACM SIGPLAN Notices , vol.28 , Issue.6 , pp. 177-186
    • Grunwald, D.1    Zorn, B.2    Henderson, R.3
  • 18
    • 0000596666 scopus 로고
    • Purify: Fast detection of memory leaks and access errors
    • San Francisco, California
    • R. Hastings and B. Joyce. Purify: Fast detection of memory leaks and access errors. In Proc. of the Winter 1992 USENIX Conference, pages 125-138, San Francisco, California, 1991.
    • (1991) Proc. of the Winter 1992 USENIX Conference , pp. 125-138
    • Hastings, R.1    Joyce, B.2
  • 23
    • 14844307465 scopus 로고    scopus 로고
    • Vudo malloc tricks
    • Aug.
    • M. Kaempf. Vudo malloc tricks. Phrack Magazine, 57(8), Aug. 2001.
    • (2001) Phrack Magazine , vol.57 , Issue.8
    • Kaempf, M.1
  • 28
    • 42549098753 scopus 로고    scopus 로고
    • Bounds-checking entire programs without recompiling
    • Venice, Italy, Jan.
    • N. Nethercote and J. Fitzhardinge. Bounds-checking entire programs without recompiling. In SPACE 2004, Venice, Italy, Jan. 2004.
    • (2004) SPACE 2004
    • Nethercote, N.1    Fitzhardinge, J.2
  • 30
    • 84885578759 scopus 로고    scopus 로고
    • Rx: Treating bugs as allergies: A safe method to survive software failures
    • Proceedings of the Twentieth Symposium on Operating Systems Principles, Brighton, UK, Oct. ACM
    • F. Qin, J. Tucek, J. Sundaresan, and Y. Zhou. Rx: Treating bugs as allergies: A safe method to survive software failures. In Proceedings of the Twentieth Symposium on Operating Systems Principles, volume XX of Operating Systems Review, Brighton, UK, Oct. 2005. ACM.
    • (2005) Operating Systems Review , vol.20
    • Qin, F.1    Tucek, J.2    Sundaresan, J.3    Zhou, Y.4
  • 34
    • 0016080536 scopus 로고
    • Bounds for some functions concerning dynamic storage allocation
    • July
    • J. M. Robson. Bounds for some functions concerning dynamic storage allocation. Journal of the ACM, 21(3):419-499, July 1974.
    • (1974) Journal of the ACM , vol.21 , Issue.3 , pp. 419-499
    • Robson, J.M.1
  • 37
    • 84858912253 scopus 로고    scopus 로고
    • Standard Performance Evaluation Corporation. SPEC2000. http://www.spec.org.
    • SPEC2000
  • 38
    • 33745189937 scopus 로고    scopus 로고
    • Experience with safe manual memory management in Cyclone
    • Special issue on memory management. Expands ISMM conference paper of the same name. To appear
    • N. Swamy, M. Hicks, G. Morrisett, D. Grossman, and T. Jim. Experience with safe manual memory management in Cyclone. Science of Computer Programming, 2006. Special issue on memory management. Expands ISMM conference paper of the same name. To appear.
    • (2006) Science of Computer Programming
    • Swamy, N.1    Hicks, M.2    Morrisett, G.3    Grossman, D.4    Jim, T.5
  • 40
    • 84958662213 scopus 로고
    • Dynamic storage allocation: A survey and critical review
    • Proceedings of the International Workshop on Memory Management, Kinross, Scotland, Sept. Springer-Verlag
    • P. R. Wilson, M. S. Johnstone, M. Neely, and D. Boles. Dynamic storage allocation: A survey and critical review. In Proceedings of the International Workshop on Memory Management, volume 986 of Lecture Notes in Computer Science, pages 1-116, Kinross, Scotland, Sept. 1995. Springer-Verlag.
    • (1995) Lecture Notes in Computer Science , vol.986 , pp. 1-116
    • Wilson, P.R.1    Johnstone, M.S.2    Neely, M.3    Boles, D.4
  • 43
    • 33745221555 scopus 로고    scopus 로고
    • Security of memory allocators for C and C++
    • Department of Computer Science, Katholieke Universiteit Leuven, Belgium, July
    • Y. Younan, W. Joosen, F. Piessens, and H. V. den Eynden. Security of memory allocators for C and C++. Technical Report CW 419, Department of Computer Science, Katholieke Universiteit Leuven, Belgium, July 2005. Available at http://www.cs.kuleuven.ac.be/publicaties/rapporten/cw/CW419.pdf.
    • (2005) Technical Report , vol.CW 419
    • Younan, Y.1    Joosen, W.2    Piessens, F.3    Den Eynden, H.V.4
  • 44
    • 0027626223 scopus 로고
    • The measured cost of conservative garbage collection
    • B. Zorn. The measured cost of conservative garbage collection. Software Practice and Experience, 23:733-756, 1993.
    • (1993) Software Practice and Experience , vol.23 , pp. 733-756
    • Zorn, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.