-
1
-
-
0027963879
-
Efficient detection of all pointer and array access errors
-
New York, NY, USA, ACM. Press
-
T. M. Austin, S. E. Breach, and G. S. Sohi. Efficient detection of all pointer and array access errors. In Proceedings of the ACM SlGPLAN 1994 Conference on Programming Language Design and Implementation, pages 290-301, New York, NY, USA, 1994. ACM. Press.
-
(1994)
Proceedings of the ACM SlGPLAN 1994 Conference on Programming Language Design and Implementation
, pp. 290-301
-
-
Austin, T.M.1
Breach, S.E.2
Sohi, G.S.3
-
2
-
-
33244470892
-
Improving software security with a C pointer analysis
-
New York, NY, USA, ACM Press
-
D. Avots, M. Dalton, V. B. Livshits, and M. S. Lam. Improving software security with a C pointer analysis. In Proceedings of the 27th International Conference on Software Engineering, pages 332341, New York, NY, USA, 2005. ACM Press.
-
(2005)
Proceedings of the 27th International Conference on Software Engineering
, pp. 332341
-
-
Avots, D.1
Dalton, M.2
Livshits, V.B.3
Lam, M.S.4
-
3
-
-
33746101822
-
DieHard: Probabilistic memory safety for unsafe languages
-
New York, NY, USA, ACM Press
-
E. D. Berger and B. G. Zorn. DieHard: Probabilistic memory safety for unsafe languages. In Proceedings of the 2006 ACM SIGPLAN Conference on Programming Language Design and Implementation, pages 158-168, New York, NY, USA, 2006. ACM Press.
-
(2006)
Proceedings of the 2006 ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 158-168
-
-
Berger, E.D.1
Zorn, B.G.2
-
4
-
-
35448932002
-
Efficient probabilistic memory safety
-
TR-2007-17, Department of Computer Science, University of Massachusetts Amherst, Mar
-
E. D. Berger and B. G. Zorn. Efficient probabilistic memory safety. Technical Report UMCS TR-2007-17, Department of Computer Science, University of Massachusetts Amherst, Mar. 2007.
-
(2007)
Technical Report UMCS
-
-
Berger, E.D.1
Zorn, B.G.2
-
5
-
-
0034830634
-
Composing highperformance memory allocators
-
Snowbird, Utah, June
-
E. D. Berger, B. G. Zorn, and K. S. McKinley. Composing highperformance memory allocators. In Proceedings of the 2001 ACM SIGPLAN Conference on Programming Language Design and Implementation, Snowbird, Utah, June 2001.
-
(2001)
Proceedings of the 2001 ACM SIGPLAN Conference on Programming Language Design and Implementation
-
-
Berger, E.D.1
Zorn, B.G.2
McKinley, K.S.3
-
7
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
USENIX, Aug
-
S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In Proceedings of the 12th USENIX Security Symposium, pages 105-120. USENIX, Aug. 2003.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 105-120
-
-
Bhatkar, S.1
DuVarney, D.C.2
Sekar, R.3
-
9
-
-
0024085322
-
Garbage collection in an uncooperative environment
-
H.-J. Boehm and M. Weiser. Garbage collection in an uncooperative environment. Software Practice and Experience, 18(9):807-820, 1988.
-
(1988)
Software Practice and Experience
, vol.18
, Issue.9
, pp. 807-820
-
-
Boehm, H.-J.1
Weiser, M.2
-
11
-
-
34247373512
-
Inference and enforcement of data structure consistency specifications
-
New York, NY, USA, ACM. Press
-
B. Demsky, M. D. Ernst, P. J. Guo, S. McCamant, J. H. Perkins, and M. Rinard. Inference and enforcement of data structure consistency specifications. In Proceedings of the 2006 International Symposium on Software Testing and Analysis, pages 233-244, New York, NY, USA, 2006. ACM. Press.
-
(2006)
Proceedings of the 2006 International Symposium on Software Testing and Analysis
, pp. 233-244
-
-
Demsky, B.1
Ernst, M.D.2
Guo, P.J.3
McCamant, S.4
Perkins, J.H.5
Rinard, M.6
-
12
-
-
1442288535
-
Automatic detection and repair of errors in data structures
-
New York, NY, USA, ACM Press
-
B. Demsky and M. Rinard. Automatic detection and repair of errors in data structures. In Proceedings of the 18th annual ACM SIGPLAN Conference on Object-oriented Programing, Systems, Languages, and Applications, pages 78-95, New York, NY, USA, 2003. ACM Press.
-
(2003)
Proceedings of the 18th annual ACM SIGPLAN Conference on Object-oriented Programing, Systems, Languages, and Applications
, pp. 78-95
-
-
Demsky, B.1
Rinard, M.2
-
16
-
-
33746057447
-
SAFEcode: Enforcing alias analysis for weakly typed languages
-
New York, NY, USA, ACM. Press
-
D. Dhurjati, S. Kowshik, and V. Adve. SAFEcode: enforcing alias analysis for weakly typed languages. In Proceedings of the 2006 ACM SIGPLAN Conference on Programming Language Design and Implementation, pages 144-157, New York, NY, USA, 2006. ACM. Press.
-
(2006)
Proceedings of the 2006 ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 144-157
-
-
Dhurjati, D.1
Kowshik, S.2
Adve, V.3
-
17
-
-
1442288714
-
Memory safety without runtime checks or garbage collection
-
San Diego, CA, June, ACM Press
-
D. Dhurjati, S. Kowshik, V. Adve, and C. Lattner. Memory safety without runtime checks or garbage collection. In ACM SIGPLAN 2003 Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES'2003), San Diego, CA, June 2003. ACM Press.
-
(2003)
ACM SIGPLAN 2003 Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES'2003)
-
-
Dhurjati, D.1
Kowshik, S.2
Adve, V.3
Lattner, C.4
-
18
-
-
0033698745
-
Quickly detecting relevant program invariants
-
New York, NY, USA, ACM Press
-
M. D. Ernst, A. Czeisler, W. G. Griswold, and D. Notkin. Quickly detecting relevant program invariants. In Proceedings of the 22nd International Conference on Software Engineering, pages 449-458, New York, NY, USA, 2000. ACM Press.
-
(2000)
Proceedings of the 22nd International Conference on Software Engineering
, pp. 449-458
-
-
Ernst, M.D.1
Czeisler, A.2
Griswold, W.G.3
Notkin, D.4
-
19
-
-
0027797652
-
Improving the cache locality of memory allocation
-
Proceedings of SIGPLAN'93 Conference on Programming Languages Design and Implementation, 6 of, Albuquerque, NM, June, ACM Press
-
D. Grunwald, B. Zorn, and R. Henderson. Improving the cache locality of memory allocation. In Proceedings of SIGPLAN'93 Conference on Programming Languages Design and Implementation, volume 28(6) of ACM SIGPLAN Notices, pages 177-186, Albuquerque, NM, June 1993. ACM Press.
-
(1993)
ACM SIGPLAN Notices
, vol.28
, pp. 177-186
-
-
Grunwald, D.1
Zorn, B.2
Henderson, R.3
-
20
-
-
33845564157
-
Tracking probabilistic correlation of monitoring data for fault detection in complex systems
-
Los Alamitos, CA, USA, IEEE Computer Society
-
Z. Guo, G. Jiang, H. Chen, and K. Yoshihira. Tracking probabilistic correlation of monitoring data for fault detection in complex systems. In Proceedings of the 2006 International Conference on Dependable Systems and Networks, pages 259-268, Los Alamitos, CA, USA, 2006. IEEE Computer Society.
-
(2006)
Proceedings of the 2006 International Conference on Dependable Systems and Networks
, pp. 259-268
-
-
Guo, Z.1
Jiang, G.2
Chen, H.3
Yoshihira, K.4
-
21
-
-
0000596666
-
Purify: Fast detection of memory leaks and access errors
-
San Francisco, California
-
R. Hastings and B. Joyce. Purify: Fast detection of memory leaks and access errors. In Proc. of the Winter 1992 USENIX Conference, pages 125-138, San Francisco, California, 1991.
-
(1991)
Proc. of the Winter 1992 USENIX Conference
, pp. 125-138
-
-
Hastings, R.1
Joyce, B.2
-
23
-
-
34547520411
-
Comprehensively and efficiently protecting the heap
-
New York, NY, USA, ACM. Press
-
M. Kharbutli, X. Jiang, Y. Solihin, G. Venkataramani, and M. Prvulovic. Comprehensively and efficiently protecting the heap. In Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems, pages 207-218, New York, NY, USA, 2006. ACM. Press.
-
(2006)
Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 207-218
-
-
Kharbutli, M.1
Jiang, X.2
Solihin, Y.3
Venkataramani, G.4
Prvulovic, M.5
-
26
-
-
31844452362
-
Scalable statistical bug isolation
-
New York, NY, USA, ACM Press
-
B. Liblit, M. Naik, A. X. Zheng, A. Aiken, and M. I. Jordan. Scalable statistical bug isolation. In Proceedings of the ACM SlGPLAN 2005 Conference on Programming Language Design and Implementation, pages 15-26, New York, NY, USA, 2005. ACM Press.
-
(2005)
Proceedings of the ACM SlGPLAN 2005 Conference on Programming Language Design and Implementation
, pp. 15-26
-
-
Liblit, B.1
Naik, M.2
Zheng, A.X.3
Aiken, A.4
Jordan, M.I.5
-
27
-
-
32344442835
-
SOBER: Statistical, model-based bug localization
-
New York, NY, USA, ACM Press
-
C. Liu, X. Yan, L. Fei, J. Han, and S. P. Midkiff. SOBER: statistical, model-based bug localization. In Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International. Symposium on Foundations of Software Engineering, pages 286-295, New York, NY, USA, 2005. ACM Press.
-
(2005)
Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International. Symposium on Foundations of Software Engineering
, pp. 286-295
-
-
Liu, C.1
Yan, X.2
Fei, L.3
Han, J.4
Midkiff, S.P.5
-
28
-
-
34247107486
-
-
G. Misherghi and Z. Su. HDD: Hierarchical delta debugging. In Proceedings of the 28th International Conference on Software Engineering, pages 142-151, New York, NY, USA, 2006. ACM Press.
-
G. Misherghi and Z. Su. HDD: Hierarchical delta debugging. In Proceedings of the 28th International Conference on Software Engineering, pages 142-151, New York, NY, USA, 2006. ACM Press.
-
-
-
-
29
-
-
0036040304
-
CCured: Type-safe retrofitting of legacy code
-
New York, NY, USA, ACM Press
-
G. C. Necula, S. McPeak, and W. Weimer. CCured: type-safe retrofitting of legacy code. In Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of Programming Languages, pages 128-139, New York, NY, USA, 2002. ACM Press.
-
(2002)
Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of Programming Languages
, pp. 128-139
-
-
Necula, G.C.1
McPeak, S.2
Weimer, W.3
-
30
-
-
42549098753
-
Bounds-checking entire programs without recompiling
-
Venice, Italy, Jan
-
N. Nethercote and J. Fitzhardinge. Bounds-checking entire programs without recompiling. In SPACE 2004, Venice, Italy, Jan. 2004.
-
(2004)
SPACE 2004
-
-
Nethercote, N.1
Fitzhardinge, J.2
-
32
-
-
84885578759
-
Rx: Treating bugs as allergies: A safe method to survive software failures
-
Proceedings of the Twentieth Symposium on Operating Systems Principles, of, Brighton, UK, Oct, ACM
-
F. Qin, J. Tucek, J. Sundaresan, and Y. Zhou. Rx: Treating bugs as allergies: A safe method to survive software failures. In Proceedings of the Twentieth Symposium on Operating Systems Principles, volume XX of Operating Systems Review, Brighton, UK, Oct. 2005. ACM.
-
(2005)
Operating Systems Review
, vol.20
-
-
Qin, F.1
Tucek, J.2
Sundaresan, J.3
Zhou, Y.4
-
34
-
-
33646829087
-
SWIFT: Software Implemented Fault Tolerance
-
Washington, DC, USA, IEEE Computer Society
-
G. A. Reis, J. Chang, N. Vachharajani, R. Rangan, and D. I. August. SWIFT: Software Implemented Fault Tolerance. In Proceedings of the International Symposium on Code Generation and Optimization, pages 243-254, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
Proceedings of the International Symposium on Code Generation and Optimization
, pp. 243-254
-
-
Reis, G.A.1
Chang, J.2
Vachharajani, N.3
Rangan, R.4
August, D.I.5
-
35
-
-
21644473822
-
A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors)
-
Dec
-
M. Rinard, C. Cadar, D. Duinitran, D. M. Roy, and T. Leu. A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors). In Proceedings of the 2004 Annual. Computer Security Applications Conference, Dec. 2004.
-
(2004)
Proceedings of the 2004 Annual. Computer Security Applications Conference
-
-
Rinard, M.1
Cadar, C.2
Duinitran, D.3
Roy, D.M.4
Leu, T.5
-
36
-
-
84906487819
-
Enhancing server availability and security through failureoblivious computing
-
San Francisco, CA, Dec, USENIX
-
M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and J. William S. Beebee. Enhancing server availability and security through failureoblivious computing. In Sixth Symposium on Operating Systems Design and Implementation, San Francisco, CA, Dec. 2004. USENIX.
-
(2004)
Sixth Symposium on Operating Systems Design and Implementation
-
-
Rinard, M.1
Cadar, C.2
Dumitran, D.3
Roy, D.M.4
Leu, T.5
William, J.6
Beebee, S.7
-
37
-
-
85094678188
-
-
W. Robertson, C. Kruegel, D. Mutz, and F. Valeur. Run-time detection of heap-based overflows. In Proceedings of the 17th Large Installation Systems Administration Conference, pages 5.160. USENIX, 2003.
-
W. Robertson, C. Kruegel, D. Mutz, and F. Valeur. Run-time detection of heap-based overflows. In Proceedings of the 17th Large Installation Systems Administration Conference, pages 5.160. USENIX, 2003.
-
-
-
-
38
-
-
35448988515
-
-
G. S. Roy. mpatrol: Related software. http://www.cbmami.ga.demon. co.uk/mpatrol/mpatrol.83.html, Nov. 2006.
-
G. S. Roy. mpatrol: Related software. http://www.cbmami.ga.demon. co.uk/mpatrol/mpatrol.83.html, Nov. 2006.
-
-
-
-
41
-
-
84906497159
-
Building a reactive immune system for software services
-
USENIX
-
S. Sidiroglou, M. E. Locasto, S. W. Boyd, and A. D. Keromytis. Building a reactive immune system for software services. In USENIX Annual Technical Conference, pages 149-161. USENIX, 2005.
-
(2005)
USENIX Annual Technical Conference
, pp. 149-161
-
-
Sidiroglou, S.1
Locasto, M.E.2
Boyd, S.W.3
Keromytis, A.D.4
-
42
-
-
59249094964
-
From STEM, to SEAD: Speculative execution for automated defense
-
USENIX
-
S. Sidiroglou, M. E. Locasto, S. W. Boyd, and A. D. Keromytis. From STEM, to SEAD: Speculative execution for automated defense. In USENIX Annual Technical Conference. USENIX, 2007.
-
(2007)
USENIX Annual Technical Conference
-
-
Sidiroglou, S.1
Locasto, M.E.2
Boyd, S.W.3
Keromytis, A.D.4
-
43
-
-
84858359764
-
-
Standard Performance Evaluation Corporation
-
Standard Performance Evaluation Corporation. SPEC2000. http://www.spec.org.
-
, vol.SPEC2000
-
-
-
45
-
-
20344383014
-
An efficient and backwardscompatible transformation to ensure memory safety of C programs
-
New York, NY, USA, ACM Press
-
W. Xu, D. C. DuVarney, and R. Sekar. An efficient and backwardscompatible transformation to ensure memory safety of C programs. In Proceedings of the 12th ACM SIGSOFT Twelfth International Symposium on Foundations of Software Engineering, pages 117-126, New York, NY, USA, 2004. ACM Press.
-
(2004)
Proceedings of the 12th ACM SIGSOFT Twelfth International Symposium on Foundations of Software Engineering
, pp. 117-126
-
-
Xu, W.1
DuVarney, D.C.2
Sekar, R.3
-
46
-
-
1542376931
-
Protecting C programs from attacks via invalid pointer dereferences
-
New York, NY, USA, ACM Press
-
S. H. Yong and S. Horwitz. Protecting C programs from attacks via invalid pointer dereferences. In 11th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pages 307-316, New York, NY, USA, 2003. ACM Press.
-
(2003)
11th ACM SIGSOFT International Symposium on Foundations of Software Engineering
, pp. 307-316
-
-
Yong, S.H.1
Horwitz, S.2
-
47
-
-
33745221555
-
Security of memory allocators for C and C++
-
Department of Computer Science, Katholieke Universiteit Leuven, Belgium, July
-
Y. Younan, W. Joosen, F. Piessens, and H. V. den Eynden. Security of memory allocators for C and C++. Technical Report CW 419, Department of Computer Science, Katholieke Universiteit Leuven, Belgium, July 2005.
-
(2005)
Technical Report CW
, vol.419
-
-
Younan, Y.1
Joosen, W.2
Piessens, F.3
den Eynden, H.V.4
-
48
-
-
84860400978
-
Yesterday, my program worked. Today, it does not. Why?
-
London, UK, Springer-Verlag
-
A. Zeller. Yesterday, my program worked. Today, it does not. Why? In Proceedings of the 7th European Software Engineering Conference held jointly with the 7th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pages 253-267, London, UK, 1999. Springer-Verlag.
-
(1999)
Proceedings of the 7th European Software Engineering Conference held jointly with the 7th ACM SIGSOFT International Symposium on Foundations of Software Engineering
, pp. 253-267
-
-
Zeller, A.1
|