-
1
-
-
66749184188
-
-
Bochs: The cross platform IA-32 emulator. http://bochs. sourceforge.net.
-
Bochs: The cross platform IA-32 emulator. http://bochs. sourceforge.net.
-
-
-
-
2
-
-
27544498541
-
Defeating memory corruption attacks via pointer taintedness detection
-
S. Chen, J. Xu, N. Nakka, Z. Kalbarczyk, and R. K. Iyer. Defeating memory corruption attacks via pointer taintedness detection. In Proc. of Dependable Systems and Networks (DSN), 2005.
-
(2005)
Proc. of Dependable Systems and Networks (DSN)
-
-
Chen, S.1
Xu, J.2
Nakka, N.3
Kalbarczyk, Z.4
Iyer, R.K.5
-
7
-
-
84868989972
-
-
Feb. 2007
-
H. de Vries. Chip-Architect.com, Feb. 2007. http://www. chip-architect.com/news/2007-02-19-Various-Images.html.
-
Chip-Architect.com
-
-
de Vries, H.1
-
9
-
-
34748845128
-
Practical taint-based protection using demand emulation
-
A. Ho, M. Fetterman, C. Clark, A. Warfield, and S. Hand. Practical taint-based protection using demand emulation. In Proc. of European Conference in Computer Systems, 2006.
-
(2006)
Proc. of European Conference in Computer Systems
-
-
Ho, A.1
Fetterman, M.2
Clark, C.3
Warfield, A.4
Hand, S.5
-
14
-
-
31844452362
-
Scalable statistical bug isolation
-
B. Liblit, M. Naik, A. Zheng, A. Aiken, and M. Jordan. Scalable statistical bug isolation. In Proc. of ACM Conference on Programming Language Design and Implementation, 2005.
-
(2005)
Proc. of ACM Conference on Programming Language Design and Implementation
-
-
Liblit, B.1
Naik, M.2
Zheng, A.3
Aiken, A.4
Jordan, M.5
-
16
-
-
0036469676
-
Simics: A full system simulation platform
-
P. S. Magnusson, M. Christensson, J. Eskilson, D. Forsgren, G. Hållberg, J. Högberg, F. Larsson, A. Moestedt, and B. Werner. Simics: A full system simulation platform. IEEE Computer, 35(2), 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.2
-
-
Magnusson, P.S.1
Christensson, M.2
Eskilson, J.3
Forsgren, D.4
Hållberg, G.5
Högberg, J.6
Larsson, F.7
Moestedt, A.8
Werner, B.9
-
17
-
-
35448931569
-
Quantitative information-flow tracking for c and related languages. Technical report, MIT-CSAIL
-
Nov
-
S. McCamant and M. D. Ernst. Quantitative information-flow tracking for c and related languages. Technical report, MIT-CSAIL, Nov. 2006.
-
(2006)
-
-
McCamant, S.1
Ernst, M.D.2
-
19
-
-
34748914333
-
An 8-core, 64-thread, 64-bit, power efficient SPARC SoC: (Niagara 2)
-
U. G. Nawathe, M. Hassan, L. Warriner, K. Yen, B. Upputuri, D. Greenhill, A. Kumar, and H. Park. An 8-core, 64-thread, 64-bit, power efficient SPARC SoC: (Niagara 2). In Proc. of International Solid State Circuits Conference (ISSCC), 2007.
-
(2007)
Proc. of International Solid State Circuits Conference (ISSCC)
-
-
Nawathe, U.G.1
Hassan, M.2
Warriner, L.3
Yen, K.4
Upputuri, B.5
Greenhill, D.6
Kumar, A.7
Park, H.8
-
20
-
-
66749120197
-
-
Netcraft Ltd. April 2008 web server survey. http://news.netcraft.com/ archives/2008/04/14/april-2008-web-server-survey.html.
-
Netcraft Ltd. April 2008 web server survey. http://news.netcraft.com/ archives/2008/04/14/april-2008-web-server-survey.html.
-
-
-
-
23
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proc. of Network and Distributed System Security Symposium (NDSS), 2005.
-
(2005)
Proc. of Network and Distributed System Security Symposium (NDSS)
-
-
Newsome, J.1
Song, D.2
-
25
-
-
40349087553
-
-
F. Qin, C. Wang, Z. Li, H.-S. Kim, Y. Zhou, and Y. Wu. LIFT: A low-overhead practical information flow tracking system for detecting security attacks. In Proc. of International Symposium on Microarchitecture (MICRO), 2006.
-
F. Qin, C. Wang, Z. Li, H.-S. Kim, Y. Zhou, and Y. Wu. LIFT: A low-overhead practical information flow tracking system for detecting security attacks. In Proc. of International Symposium on Microarchitecture (MICRO), 2006.
-
-
-
-
31
-
-
66749089290
-
-
S. Thoziyoor, N. Muralimanohar, and N. Jouppi. CACTI 5.0. http://www.hpl.hp.com/techreports/2007/HPL-2007-167. pdf, Oct. 2007.
-
S. Thoziyoor, N. Muralimanohar, and N. Jouppi. CACTI 5.0. http://www.hpl.hp.com/techreports/2007/HPL-2007-167. pdf, Oct. 2007.
-
-
-
-
32
-
-
21644475650
-
RIFLE: An architectural framework for user-centric information-flow security
-
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August. RIFLE: An architectural framework for user-centric information-flow security. In Proc. of International Symposium on Microarchitecture (MICRO), 2004.
-
(2004)
Proc. of International Symposium on Microarchitecture (MICRO)
-
-
Vachharajani, N.1
Bridges, M.J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.A.6
Reis, G.A.7
Vachharajani, M.8
August, D.I.9
-
35
-
-
85038810709
-
Taint-enhanced policy enforcement: A practial approach to defeat a wide range of attacks
-
W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practial approach to defeat a wide range of attacks. In Proceedings of USENIX Security Conference, 2006.
-
(2006)
Proceedings of USENIX Security Conference
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
|