-
2
-
-
27544498541
-
Defeating Memory Corruption Attacks via Pointer Taintedness Detection
-
S. Chen, J. Xu, N. Nakka, Z. Kalbarczyk, and R. Iyer. Defeating Memory Corruption Attacks via Pointer Taintedness Detection. Proc. 2005 International Conference on Dependable Systems and Networks, 2005.
-
(2005)
Proc. 2005 International Conference on Dependable Systems and Networks
-
-
Chen, S.1
Xu, J.2
Nakka, N.3
Kalbarczyk, Z.4
Iyer, R.5
-
3
-
-
85084160792
-
Understanding Data Lifetime via Whole System Simulation
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding Data Lifetime via Whole System Simulation. Proc. 13th USENIX Security Symposium, 2004.
-
(2004)
Proc. 13th USENIX Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
5
-
-
34748845128
-
Practical Taint-Based Protection using Demand Emulation
-
A. Ho, M. Fetterman, C. Clark, A. Warfield, and S. Hand. Practical Taint-Based Protection using Demand Emulation. Proc. European Conference in Computer Systems, 2006.
-
(2006)
Proc. European Conference in Computer Systems
-
-
Ho, A.1
Fetterman, M.2
Clark, C.3
Warfield, A.4
Hand, S.5
-
10
-
-
79953672829
-
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
-
J. Newsome and D. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. Proc. 12th Annual Network and Distributed System Security Symposium, 2005.
-
(2005)
Proc. 12th Annual Network and Distributed System Security Symposium
-
-
Newsome, J.1
Song, D.2
-
11
-
-
57749171230
-
-
O'Reilly. http://search.cpan.org/dist/perl/pod/perlsec.pod. Perl Security, 2005.
-
(2005)
Perl Security
-
-
O'Reilly1
-
14
-
-
57749186732
-
-
J. Renau et al. Sesc. http://sesc.sourceforge.net, 2006.
-
(2006)
Sesc
-
-
Renau, J.1
-
15
-
-
34547197631
-
Heap-Mon: A Low Overhead, Automatic, and Programmable Memory Bug Detector
-
R. Shetty, M. Kharbutli, Y. Solihin, and M. Prvulovic. Heap-Mon: a Low Overhead, Automatic, and Programmable Memory Bug Detector. In Proc. 1st IBM T.J. Watson Conference on Interaction between Architecture, Circuits, and Compilers (PAC2), 2004.
-
(2004)
Proc. 1st IBM T.J. Watson Conference on Interaction between Architecture, Circuits, and Compilers (PAC2)
-
-
Shetty, R.1
Kharbutli, M.2
Solihin, Y.3
Prvulovic, M.4
-
16
-
-
33646068753
-
Heapmon: A helper-thread approach to programmable, automatic, and low-overhead memory bug detection
-
R. Shetty, M. Kharbutli, Y. Solihin, and M. Prvulovic. Heapmon: A helper-thread approach to programmable, automatic, and low-overhead memory bug detection. IBM Journal of Research and Development, 50(2/3):261-275, 2006.
-
(2006)
IBM Journal of Research and Development
, vol.50
, Issue.2-3
, pp. 261-275
-
-
Shetty, R.1
Kharbutli, M.2
Solihin, Y.3
Prvulovic, M.4
-
19
-
-
0029179077
-
The SPLASH-2 Programs: Characterization and Methodological Considerations
-
S.Woo, M.Ohara, E.Torrie, J.Singh, and A.Gupta. The SPLASH-2 Programs: Characterization and Methodological Considerations. Proc. 22nd International Symposium on Computer Architecture, 1995.
-
(1995)
Proc. 22nd International Symposium on Computer Architecture
-
-
Woo, S.1
Ohara, M.2
Torrie, E.3
Singh, J.4
Gupta, A.5
-
21
-
-
21644475650
-
RIFLE: An Architectural Framework for User-Centric Information-Flow Security
-
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August. RIFLE: An Architectural Framework for User-Centric Information-Flow Security. Proc. 37th International Symposium on Microarchitecture, 2004.
-
(2004)
Proc. 37th International Symposium on Microarchitecture
-
-
Vachharajani, N.1
Bridges, M.J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.A.6
Reis, G.A.7
Vachharajani, M.8
August, D.I.9
-
23
-
-
85038810709
-
Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks
-
W. Xu, S. Bhatkar, and R.Sekar. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks. Usenix Security Symposium, 2006.
-
(2006)
Usenix Security Symposium
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
|