메뉴 건너뛰기




Volumn , Issue , 2008, Pages 152-159

Avoiding program failures through safe execution perturbations

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER APPLICATIONS; COMPUTER SOFTWARE; COMPUTERS; INFORMATION THEORY; WORD PROCESSING;

EID: 51949119271     PISSN: 07303157     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/COMPSAC.2008.23     Document Type: Conference Paper
Times cited : (8)

References (25)
  • 1
    • 51949107146 scopus 로고    scopus 로고
    • http://bugs.mysql.com/bug.php?id=110.
  • 2
    • 51949103073 scopus 로고    scopus 로고
    • http://bugs.mysql.com/bug.php?id=169.
  • 3
    • 51949098837 scopus 로고    scopus 로고
    • http://bugs.mysql.com/bug.php?id=6678.
  • 4
    • 51949090688 scopus 로고    scopus 로고
    • http://bugs.mysql.com/bug.php?id=791.
  • 5
    • 51949106948 scopus 로고    scopus 로고
    • http://www.securiteam.com/unixfocus/5fp0t0u9fu.html.
  • 6
    • 51949117485 scopus 로고    scopus 로고
    • http://www.securityfocus.com/bid/6120.
  • 7
    • 51949117292 scopus 로고    scopus 로고
    • http://www.xatrix.org/advisory.php?s=7408.
  • 8
    • 51949091073 scopus 로고    scopus 로고
    • www.mutt.org.
  • 9
    • 0034590182 scopus 로고    scopus 로고
    • S. Chandra and P. M. Chen. Whither generic recovery from application faults? a fault study using open-source software. In DSN 2000.
    • S. Chandra and P. M. Chen. Whither generic recovery from application faults? a fault study using open-source software. In DSN 2000.
  • 12
    • 0027575284 scopus 로고
    • Simulating reactive systems by deduction
    • Y. A. Feldman and H. Schneider. Simulating reactive systems by deduction. ACMTOSEM, 2(2):128-175, 1993.
    • (1993) ACMTOSEM , vol.2 , Issue.2 , pp. 128-175
    • Feldman, Y.A.1    Schneider, H.2
  • 13
    • 0000596666 scopus 로고
    • Purify: Fast detection of memory leaks and access errors
    • R. Hastings and B. Joyce. Purify: Fast detection of memory leaks and access errors. In USENIX, pages 125-138, 1991.
    • (1991) USENIX , pp. 125-138
    • Hastings, R.1    Joyce, B.2
  • 14
    • 84976719520 scopus 로고
    • Recovery in distributed systems using optimistic message logging and checkpointing
    • D. B. Johnson and W. Zwaenepoel. Recovery in distributed systems using optimistic message logging and checkpointing. In PODC, pages 171-181, 1988.
    • (1988) PODC , pp. 171-181
    • Johnson, D.B.1    Zwaenepoel, W.2
  • 15
    • 1442264311 scopus 로고    scopus 로고
    • Bug isolation via remote program sampling
    • B. Liblit, A. Aiken, A. X. Zheng, and M. I. Jordan. Bug isolation via remote program sampling. In PLDI, pages 141-154, 2003.
    • (2003) PLDI , pp. 141-154
    • Liblit, B.1    Aiken, A.2    Zheng, A.X.3    Jordan, M.I.4
  • 16
    • 34249774237 scopus 로고    scopus 로고
    • Avio: Detecting atomicity violations via access interleaving invariants
    • S. Lu, J. Tucek, F. Qin, and Y. Zhou. Avio: detecting atomicity violations via access interleaving invariants. In ASPLOS 2006.
    • (2006) ASPLOS
    • Lu, S.1    Tucek, J.2    Qin, F.3    Zhou, Y.4
  • 17
    • 33644931598 scopus 로고    scopus 로고
    • Bugnet: Recording application-level execution for deterministic replay debugging
    • S. Narayanasamy, G. Pokam, and B. Calder. Bugnet: Recording application-level execution for deterministic replay debugging. IEEE Micro, 26(1):100-109, 2006.
    • (2006) IEEE Micro , vol.26 , Issue.1 , pp. 100-109
    • Narayanasamy, S.1    Pokam, G.2    Calder, B.3
  • 19
    • 28444490333 scopus 로고    scopus 로고
    • Safemem: Exploiting ecc-memory for detecting memory leaks and memory corruption during production runs
    • F. Qin, S. Lu, and Y. Zhou. Safemem: Exploiting ecc-memory for detecting memory leaks and memory corruption during production runs. In HPCA, pages 291-302, 2005.
    • (2005) HPCA , pp. 291-302
    • Qin, F.1    Lu, S.2    Zhou, Y.3
  • 20
    • 84885578759 scopus 로고    scopus 로고
    • Rx: Treating bugs as allergies - a safe method to survive software failures
    • F. Qin, J. Tucek, J. Sundaresan, and Y. Zhou. Rx: treating bugs as allergies - a safe method to survive software failures. In SOSP 2005.
    • (2005) SOSP
    • Qin, F.1    Tucek, J.2    Sundaresan, J.3    Zhou, Y.4
  • 21
    • 84906487819 scopus 로고    scopus 로고
    • Enhancing server availability and security through failure-oblivious computing
    • M. C. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and W. S. Beebee. Enhancing server availability and security through failure-oblivious computing. In OSDI, pages 303-316, 2004.
    • (2004) OSDI , pp. 303-316
    • Rinard, M.C.1    Cadar, C.2    Dumitran, D.3    Roy, D.M.4    Leu, T.5    Beebee, W.S.6
  • 22
    • 0029724958 scopus 로고    scopus 로고
    • Replay for concurrent non-deterministic shared memory applications
    • M. Russinovich and B. Cogswell. Replay for concurrent non-deterministic shared memory applications. In PLDI 1996.
    • (1996) PLDI
    • Russinovich, M.1    Cogswell, B.2
  • 23
    • 29844452903 scopus 로고    scopus 로고
    • Jockey: A user-space library for record-replay debugging
    • Y. Saito. Jockey: a user-space library for record-replay debugging. In AADEBUG, pages 69-76, 2005.
    • (2005) AADEBUG , pp. 69-76
    • Saito, Y.1
  • 24
    • 0038684791 scopus 로고    scopus 로고
    • A "flight data recorder" for enabling full-system multiprocessor deterministic replay
    • M. Xu, R. Bodik, and M. D. Hill. A "flight data recorder" for enabling full-system multiprocessor deterministic replay. In ISCA, pages 122-133, 2003.
    • (2003) ISCA , pp. 122-133
    • Xu, M.1    Bodik, R.2    Hill, M.D.3
  • 25
    • 34547309741 scopus 로고    scopus 로고
    • X. Zhang, S. Tallam, and R. Gupta. Dynamic slicing long running programs through execution fast forwarding. In FSE 2006.
    • X. Zhang, S. Tallam, and R. Gupta. Dynamic slicing long running programs through execution fast forwarding. In FSE 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.