-
1
-
-
33749181800
-
-
CERT coordination center
-
Vulnerability Notes Database. CERT coordination center (http://www.kb.cert.org/vuls/).
-
Vulnerability Notes Database
-
-
-
2
-
-
4444331720
-
Security as a new dimension in embedded system design
-
June
-
P. Kocher, R. Lee, G. McGraw, and A. Raghunathan, "Security as a new dimension in embedded system design," in Proc. Design Automation Conf., June 2004, pp. 753-760.
-
(2004)
Proc. Design Automation Conf
, pp. 753-760
-
-
Kocher, P.1
Lee, R.2
McGraw, G.3
Raghunathan, A.4
-
4
-
-
33646032658
-
CCured: Type-safe retrofitting of legacy software
-
May
-
G. C. Necula, J. Condit, M. Harren, S. McPeak, and W. Weimer, "CCured: Type-safe retrofitting of legacy software," ACM Trans. Programming Languages and Systems, vol. 27, no. 3, pp. 477-526, May 2005.
-
(2005)
ACM Trans. Programming Languages and Systems
, vol.27
, Issue.3
, pp. 477-526
-
-
Necula, G.C.1
Condit, J.2
Harren, M.3
McPeak, S.4
Weimer, W.5
-
5
-
-
1542317050
-
ARCHER: Using symbolic, path-sensitive analysis to detect memory access errors
-
Sep
-
Y. Xie, A. Chou, and D. Engler, "ARCHER: Using symbolic, path-sensitive analysis to detect memory access errors," in Proc. European Software Engineering Conf./Int. Symp. Foundations of Software Engineering, Sep. 2003, pp. 327-336.
-
(2003)
Proc. European Software Engineering Conf./Int. Symp. Foundations of Software Engineering
, pp. 327-336
-
-
Xie, Y.1
Chou, A.2
Engler, D.3
-
6
-
-
0033688092
-
A static analyzer for finding dynamic programming errors
-
W. R. Bush, J. D. Pincus, and D. J. Sielaff, "A static analyzer for finding dynamic programming errors," Software - Practice and Experience, vol. 30, no. 7, pp. 775-802, 2000.
-
(2000)
Software - Practice and Experience
, vol.30
, Issue.7
, pp. 775-802
-
-
Bush, W.R.1
Pincus, J.D.2
Sielaff, D.J.3
-
8
-
-
0000596666
-
Purify: Fast detection of memory leaks and access errors
-
Jan
-
R. Hastings and B. Joyce, "Purify: Fast detection of memory leaks and access errors," in Proc. USENIX Conf., Jan. 1992, pp. 125-136.
-
(1992)
Proc. USENIX Conf
, pp. 125-136
-
-
Hastings, R.1
Joyce, B.2
-
9
-
-
0027963879
-
Efficient detection of all pointer and array access errors
-
June
-
T. M. Austin, S. E. Breach, and G. S. Sohi, "Efficient detection of all pointer and array access errors," in Proc. Conf. Programming Language Design and Implementation, June 1994, pp. 290-301.
-
(1994)
Proc. Conf. Programming Language Design and Implementation
, pp. 290-301
-
-
Austin, T.M.1
Breach, S.E.2
Sohi, G.S.3
-
10
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
Jan
-
C. Cowan et al., "StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks," in Proc. USENIX Security Symp., Jan. 1998, pp. 63-77.
-
(1998)
Proc. USENIX Security Symp
, pp. 63-77
-
-
Cowan, C.1
-
11
-
-
85084161775
-
FormatGuard: Automatic protection from printf format string vulnerabilities
-
Aug
-
C. Cowan, M. Barringer, S. Beattie, and G. Kroah-Hartman, "FormatGuard: Automatic protection from printf format string vulnerabilities," in Proc. USENIX Security Symp., Aug. 2001, pp. 191-199.
-
(2001)
Proc. USENIX Security Symp
, pp. 191-199
-
-
Cowan, C.1
Barringer, M.2
Beattie, S.3
Kroah-Hartman, G.4
-
12
-
-
0037702242
-
CSSV: Towards a realistic tool for statically detecting all buffer overflows in C
-
June
-
N. Dor, M. Rodeh, and M. Sagiv, "CSSV: Towards a realistic tool for statically detecting all buffer overflows in C," in Proc. Conf. Programming Lang. Design and Implementation, June 2003, pp. 155-167.
-
(2003)
Proc. Conf. Programming Lang. Design and Implementation
, pp. 155-167
-
-
Dor, N.1
Rodeh, M.2
Sagiv, M.3
-
13
-
-
0038716438
-
CCured in the real world
-
June
-
J. Condit, M. Harren, S. McPeak, G. C. Necula, and W. Weimer, "CCured in the real world," in Proc. Conf. Programming Language Design and Implementation, June 2003, pp. 232-244.
-
(2003)
Proc. Conf. Programming Language Design and Implementation
, pp. 232-244
-
-
Condit, J.1
Harren, M.2
McPeak, S.3
Necula, G.C.4
Weimer, W.5
-
14
-
-
85084164164
-
Cyclone: A safe dialect of C
-
June
-
T. Jim, G. Morrisett, D. Grossman, M. Hicks, J. Cheney, and Y. Wang, "Cyclone: A safe dialect of C," in Proc. USENIX Annual Technical Conf., June 2002, pp. 275-288.
-
(2002)
Proc. USENIX Annual Technical Conf
, pp. 275-288
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
15
-
-
50249180640
-
A processor architecture defense against buffer overflow attacks
-
Aug
-
J. P. McGregor, D. K. Karig, Z. Shi, and R. B. Lee, "A processor architecture defense against buffer overflow attacks," in Proc. Int. Conf. Information Technology: Research and Education, Aug. 2003, pp. 243-250.
-
(2003)
Proc. Int. Conf. Information Technology: Research and Education
, pp. 243-250
-
-
McGregor, J.P.1
Karig, D.K.2
Shi, Z.3
Lee, R.B.4
-
16
-
-
27644598154
-
Secure embedded processing through hardware-assisted run-time monitoring
-
Mar
-
D. Arora, S. Ravi, A. Raghunathan, and N. K. Jha, "Secure embedded processing through hardware-assisted run-time monitoring," in Proc. Design, Automation and Test in Europe Conf., Mar. 2005, pp. 178-183.
-
(2005)
Proc. Design, Automation and Test in Europe Conf
, pp. 178-183
-
-
Arora, D.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
17
-
-
29144504426
-
Micro embedded monitoring for security in application specific instruction-set processors
-
Oct
-
R. G. Ragel, S. Parameswaran, and S. M. Kia, "Micro embedded monitoring for security in application specific instruction-set processors," in Proc. Int. Conf. Compilers, Architectures and Synthesis for Embedded Systems, Oct. 2005, pp. 304-314.
-
(2005)
Proc. Int. Conf. Compilers, Architectures and Synthesis for Embedded Systems
, pp. 304-314
-
-
Ragel, R.G.1
Parameswaran, S.2
Kia, S.M.3
-
18
-
-
29144462647
-
Anomalous path detection with hardware support
-
Oct
-
T. Zhang, X. Zhuang, S. Pande, and W. Lee, "Anomalous path detection with hardware support," in Proc. Int. Conf. Compilers, Architectures and Synthesis for Embedded Systems, Oct. 2005, pp. 43-54.
-
(2005)
Proc. Int. Conf. Compilers, Architectures and Synthesis for Embedded Systems
, pp. 43-54
-
-
Zhang, T.1
Zhuang, X.2
Pande, S.3
Lee, W.4
-
19
-
-
0030836322
-
Low-cost, concurrent checking of pointer and array accesses in C programs
-
H. Patil and C. Fischer, "Low-cost, concurrent checking of pointer and array accesses in C programs," Software - Practice & Experience, vol. 27, no. 1, pp. 87-110, 1997.
-
(1997)
Software - Practice & Experience
, vol.27
, Issue.1
, pp. 87-110
-
-
Patil, H.1
Fischer, C.2
-
20
-
-
78651070319
-
The olden benchmark suite (v. 1.0)
-
"The olden benchmark suite (v. 1.0)." http://www.cs.princeton. edu/~mcc/olden.html/
-
-
-
-
21
-
-
0031339427
-
MediaBench: A tool for evaluating and synthesizing multimedia and communications systems
-
Dec
-
C. Lee, M. Potkonjak, and W. H. Mangione-Smith, "MediaBench: A tool for evaluating and synthesizing multimedia and communications systems," in Proc. Int. Symp. Microarchitecture, Dec. 1997, pp. 330-335.
-
(1997)
Proc. Int. Symp. Microarchitecture
, pp. 330-335
-
-
Lee, C.1
Potkonjak, M.2
Mangione-Smith, W.H.3
-
22
-
-
84962779213
-
MiBench: A free, commercially representative embedded benchmark suite
-
Dec
-
M. R. Guthaus, J. S. Ringenberg, D. Ernst, T. M. Austin, T. Mudge, and R. B. Brown, "MiBench: A free, commercially representative embedded benchmark suite," in Proc. Annual Wkshp. Workload Characterization, Dec. 2001, pp. 3-14.
-
(2001)
Proc. Annual Wkshp. Workload Characterization
, pp. 3-14
-
-
Guthaus, M.R.1
Ringenberg, J.S.2
Ernst, D.3
Austin, T.M.4
Mudge, T.5
Brown, R.B.6
|