메뉴 건너뛰기




Volumn , Issue , 2007, Pages 1-11

Exterminator: Automatically correcting memory errors with high probability

Author keywords

DieFast; Dynamic memory allocation; Error correction; Exterminator; Memory errors; Probabilistic algorithms; Randomized algorithms

Indexed keywords

DIEFAST; DYNAMIC MEMORY ALLOCATION; MEMORY ERRORS; PROBABILISTIC ALGORITHMS; RANDOMIZED ALGORITHMS;

EID: 35448955693     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1250734.1250736     Document Type: Conference Paper
Times cited : (54)

References (48)
  • 4
    • 35448932002 scopus 로고    scopus 로고
    • Efficient probabilistic memory safety
    • TR-2007-17, Department of Computer Science, University of Massachusetts Amherst, Mar
    • E. D. Berger and B. G. Zorn. Efficient probabilistic memory safety. Technical Report UMCS TR-2007-17, Department of Computer Science, University of Massachusetts Amherst, Mar. 2007.
    • (2007) Technical Report UMCS
    • Berger, E.D.1    Zorn, B.G.2
  • 7
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • USENIX, Aug
    • S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In Proceedings of the 12th USENIX Security Symposium, pages 105-120. USENIX, Aug. 2003.
    • (2003) Proceedings of the 12th USENIX Security Symposium , pp. 105-120
    • Bhatkar, S.1    DuVarney, D.C.2    Sekar, R.3
  • 9
    • 0024085322 scopus 로고
    • Garbage collection in an uncooperative environment
    • H.-J. Boehm and M. Weiser. Garbage collection in an uncooperative environment. Software Practice and Experience, 18(9):807-820, 1988.
    • (1988) Software Practice and Experience , vol.18 , Issue.9 , pp. 807-820
    • Boehm, H.-J.1    Weiser, M.2
  • 19
    • 0027797652 scopus 로고
    • Improving the cache locality of memory allocation
    • Proceedings of SIGPLAN'93 Conference on Programming Languages Design and Implementation, 6 of, Albuquerque, NM, June, ACM Press
    • D. Grunwald, B. Zorn, and R. Henderson. Improving the cache locality of memory allocation. In Proceedings of SIGPLAN'93 Conference on Programming Languages Design and Implementation, volume 28(6) of ACM SIGPLAN Notices, pages 177-186, Albuquerque, NM, June 1993. ACM Press.
    • (1993) ACM SIGPLAN Notices , vol.28 , pp. 177-186
    • Grunwald, D.1    Zorn, B.2    Henderson, R.3
  • 21
    • 0000596666 scopus 로고
    • Purify: Fast detection of memory leaks and access errors
    • San Francisco, California
    • R. Hastings and B. Joyce. Purify: Fast detection of memory leaks and access errors. In Proc. of the Winter 1992 USENIX Conference, pages 125-138, San Francisco, California, 1991.
    • (1991) Proc. of the Winter 1992 USENIX Conference , pp. 125-138
    • Hastings, R.1    Joyce, B.2
  • 28
    • 34247107486 scopus 로고    scopus 로고
    • G. Misherghi and Z. Su. HDD: Hierarchical delta debugging. In Proceedings of the 28th International Conference on Software Engineering, pages 142-151, New York, NY, USA, 2006. ACM Press.
    • G. Misherghi and Z. Su. HDD: Hierarchical delta debugging. In Proceedings of the 28th International Conference on Software Engineering, pages 142-151, New York, NY, USA, 2006. ACM Press.
  • 30
    • 42549098753 scopus 로고    scopus 로고
    • Bounds-checking entire programs without recompiling
    • Venice, Italy, Jan
    • N. Nethercote and J. Fitzhardinge. Bounds-checking entire programs without recompiling. In SPACE 2004, Venice, Italy, Jan. 2004.
    • (2004) SPACE 2004
    • Nethercote, N.1    Fitzhardinge, J.2
  • 32
    • 84885578759 scopus 로고    scopus 로고
    • Rx: Treating bugs as allergies: A safe method to survive software failures
    • Proceedings of the Twentieth Symposium on Operating Systems Principles, of, Brighton, UK, Oct, ACM
    • F. Qin, J. Tucek, J. Sundaresan, and Y. Zhou. Rx: Treating bugs as allergies: A safe method to survive software failures. In Proceedings of the Twentieth Symposium on Operating Systems Principles, volume XX of Operating Systems Review, Brighton, UK, Oct. 2005. ACM.
    • (2005) Operating Systems Review , vol.20
    • Qin, F.1    Tucek, J.2    Sundaresan, J.3    Zhou, Y.4
  • 37
    • 85094678188 scopus 로고    scopus 로고
    • W. Robertson, C. Kruegel, D. Mutz, and F. Valeur. Run-time detection of heap-based overflows. In Proceedings of the 17th Large Installation Systems Administration Conference, pages 5.160. USENIX, 2003.
    • W. Robertson, C. Kruegel, D. Mutz, and F. Valeur. Run-time detection of heap-based overflows. In Proceedings of the 17th Large Installation Systems Administration Conference, pages 5.160. USENIX, 2003.
  • 38
    • 35448988515 scopus 로고    scopus 로고
    • G. S. Roy. mpatrol: Related software. http://www.cbmami.ga.demon. co.uk/mpatrol/mpatrol.83.html, Nov. 2006.
    • G. S. Roy. mpatrol: Related software. http://www.cbmami.ga.demon. co.uk/mpatrol/mpatrol.83.html, Nov. 2006.
  • 43
    • 84858359764 scopus 로고    scopus 로고
    • Standard Performance Evaluation Corporation
    • Standard Performance Evaluation Corporation. SPEC2000. http://www.spec.org.
    • , vol.SPEC2000
  • 47
    • 33745221555 scopus 로고    scopus 로고
    • Security of memory allocators for C and C++
    • Department of Computer Science, Katholieke Universiteit Leuven, Belgium, July
    • Y. Younan, W. Joosen, F. Piessens, and H. V. den Eynden. Security of memory allocators for C and C++. Technical Report CW 419, Department of Computer Science, Katholieke Universiteit Leuven, Belgium, July 2005.
    • (2005) Technical Report CW , vol.419
    • Younan, Y.1    Joosen, W.2    Piessens, F.3    den Eynden, H.V.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.