-
4
-
-
50249149602
-
Preventing Memory Error Exploits with WIT
-
P. Akritidis, C. Cadar, C. Raiciu, M. Costa, and M. Castro. Preventing Memory Error Exploits with WIT. In Proceedings of the 2008 IEEE Symposium on Security and Privacy, 2008.
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy
-
-
Akritidis, P.1
Cadar, C.2
Raiciu, C.3
Costa, M.4
Castro, M.5
-
7
-
-
0038039865
-
A Static Analyzer for Large Safety-critical Software
-
June
-
B. Blanchet, P. Cousot, R. Cousot, J. Feret, L. Mauborgne, A. Miné, D. Monniaux, and X. Rival. A Static Analyzer for Large Safety-critical Software. In Proceedings of the SIGPLAN 2003 Conference on Programming Language Design and Implementation, June 2003.
-
(2003)
Proceedings of the SIGPLAN 2003 Conference on Programming Language Design and Implementation
-
-
Blanchet, B.1
Cousot, P.2
Cousot, R.3
Feret, J.4
Mauborgne, L.5
Miné, A.6
Monniaux, D.7
Rival, X.8
-
11
-
-
70350613514
-
Dependent Types for Low-Level Programming
-
Apr
-
J. Condit, M. Harren, Z. Anderson, D. Gay, and G. C. Necula. Dependent Types for Low-Level Programming. In Proceedings of the 16th European Symposium on Programming, Apr. 2007.
-
(2007)
Proceedings of the 16th European Symposium on Programming
-
-
Condit, J.1
Harren, M.2
Anderson, Z.3
Gay, D.4
Necula, G.C.5
-
12
-
-
0027574855
-
A Methodology for Procedure Cloning
-
K. D. Cooper, M. W. Hall, and K. Kennedy. A Methodology for Procedure Cloning. Comput. Lang., 19(2):105-117, 1993.
-
(1993)
Comput. Lang
, vol.19
, Issue.2
, pp. 105-117
-
-
Cooper, K.D.1
Hall, M.W.2
Kennedy, K.3
-
14
-
-
84946237235
-
Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade
-
C. Cowan, P. Wagle, C. Pu, S. Beattie, and J. Walpole. Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade. In Proceedings of the Foundations of Intrusion Tolerant Systems, 2003.
-
(2003)
Proceedings of the Foundations of Intrusion Tolerant Systems
-
-
Cowan, C.1
Wagle, P.2
Pu, C.3
Beattie, S.4
Walpole, J.5
-
19
-
-
0242612097
-
Memory Safety Without Runtime Checks or Garbage Collection
-
D. Dhurjati, S. Kowshik, V. Adve, and C. Lattner. Memory Safety Without Runtime Checks or Garbage Collection. In Proceedings of the 2003 ACM SIGPLAN Conference on Language, Compiler, and Tool for Embedded Systems (LCTES), 2003.
-
(2003)
Proceedings of the 2003 ACM SIGPLAN Conference on Language, Compiler, and Tool for Embedded Systems (LCTES)
-
-
Dhurjati, D.1
Kowshik, S.2
Adve, V.3
Lattner, C.4
-
20
-
-
0037702242
-
-
N. Dor, M. Rodeh, and M. Sagiv. CSSV: Towards a Realistic Tool for Statically Detecting All Buffer Overflows in C. In Proceedings of the SIGPLAN 2003 Conference on Programming Language Design and Implementation, June 2004.
-
N. Dor, M. Rodeh, and M. Sagiv. CSSV: Towards a Realistic Tool for Statically Detecting All Buffer Overflows in C. In Proceedings of the SIGPLAN 2003 Conference on Programming Language Design and Implementation, June 2004.
-
-
-
-
21
-
-
42549096729
-
Mudflap: Pointer Use Checking for C/C++
-
F. C. Eigler. Mudflap: Pointer Use Checking for C/C++. In GCC Developer's Summit, 2003.
-
(2003)
GCC Developer's Summit
-
-
Eigler, F.C.1
-
22
-
-
3142582577
-
Buffer Overrun Detection using Linear Programming and Static Analysis
-
V. Ganapathy, S. Jha, D. Chandler, D. Melski, and D. Vitek. Buffer Overrun Detection using Linear Programming and Static Analysis. In Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
-
-
Ganapathy, V.1
Jha, S.2
Chandler, D.3
Melski, D.4
Vitek, D.5
-
24
-
-
67650806269
-
-
Safe Programming at the C Level of Abstraction. PhD thesis, Department of Computer Science, Cornell University, Aug
-
D. Grossman. Safe Programming at the C Level of Abstraction. PhD thesis, Department of Computer Science, Cornell University, Aug. 2003.
-
(2003)
-
-
Grossman, D.1
-
25
-
-
0036040515
-
Region-Based Memory Management in Cyclone
-
June
-
D. Grossman, G. Morrisett, T. Jim, M. Hicks, Y. Wang, and J. Cheney. Region-Based Memory Management in Cyclone. In Proceedings of the SIGPLAN 2002 Conference on Programming Language Design and Implementation, June 2002.
-
(2002)
Proceedings of the SIGPLAN 2002 Conference on Programming Language Design and Implementation
-
-
Grossman, D.1
Morrisett, G.2
Jim, T.3
Hicks, M.4
Wang, Y.5
Cheney, J.6
-
28
-
-
85084164164
-
Cyclone: A Safe Dialect of C
-
June
-
T. Jim, G. Morrisett, D. Grossman, M. Hicks, J. Cheney, and Y. Wang. Cyclone: A Safe Dialect of C. In Proceedings of the 2002 USENIX Annual Technical Conference, June 2002.
-
(2002)
Proceedings of the 2002 USENIX Annual Technical Conference
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
29
-
-
67650787166
-
-
R. W. M. Jones and P. H. J. Kelly. Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs. In Third International Workshop on Automated Debugging, Nov. 1997.
-
R. W. M. Jones and P. H. J. Kelly. Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs. In Third International Workshop on Automated Debugging, Nov. 1997.
-
-
-
-
31
-
-
67650816145
-
The Linux Kernel Driver Model: The Benefits of Working Together
-
A. Oram and G. Wilson, editors, O'Reilly Media, Inc, June
-
G. Kroah-Hartman. The Linux Kernel Driver Model: The Benefits of Working Together. In A. Oram and G. Wilson, editors, Beautiful Code: Leading Programmers Explain How They Think. O'Reilly Media, Inc., June 2007.
-
(2007)
Beautiful Code: Leading Programmers Explain How They Think
-
-
Kroah-Hartman, G.1
-
34
-
-
67650819143
-
-
S. Lu, Z. Li, F. Qin, L. Tan, P. Zhou, and Y. Zhou. Bugbench: Benchmarks for Evaluating Bug Detection tools. In In PLDI Workshop on the Evaluation of Software Defect Detection Tools, June 2005.
-
S. Lu, Z. Li, F. Qin, L. Tan, P. Zhou, and Y. Zhou. Bugbench: Benchmarks for Evaluating Bug Detection tools. In In PLDI Workshop on the Evaluation of Software Defect Detection Tools, June 2005.
-
-
-
-
35
-
-
33646032658
-
CCured: Type-Safe Retrofitting of Legacy Software
-
May
-
G. C. Necula, J. Condit, M. Harren, S. McPeak, and W. Weimer. CCured: Type-Safe Retrofitting of Legacy Software. ACM Transactions on Programming Languages and Systems, 27(3), May 2005.
-
(2005)
ACM Transactions on Programming Languages and Systems
, vol.27
, Issue.3
-
-
Necula, G.C.1
Condit, J.2
Harren, M.3
McPeak, S.4
Weimer, W.5
-
37
-
-
0030836322
-
Low-Cost, Concurrent Checking of Pointer and Array Accesses in C Programs
-
H. Patil and C. N. Fischer. Low-Cost, Concurrent Checking of Pointer and Array Accesses in C Programs. Software - Practice & Experience, 27(1):87-110, 1997.
-
(1997)
Software - Practice & Experience
, vol.27
, Issue.1
, pp. 87-110
-
-
Patil, H.1
Fischer, C.N.2
-
38
-
-
4344593013
-
Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns
-
J. Pincus and B. Baker. Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns. IEEE Security & Privacy, 2(4):20-27, 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.4
, pp. 20-27
-
-
Pincus, J.1
Baker, B.2
-
39
-
-
67650803219
-
An Analysis of Conficker's Logic and Rendezvous Points
-
Technical report, SRI International, Feb. 2009
-
P. Porras, H. Saidi, and V. Yegneswaran. An Analysis of Conficker's Logic and Rendezvous Points. Technical report, SRI International, Feb. 2009.
-
-
-
Porras, P.1
Saidi, H.2
Yegneswaran, V.3
-
40
-
-
0029273301
-
Supporting Dynamic Data Structures on Distributed-Memory Machines
-
A. Rogers, M. C. Carlisle, J. H. Reppy, and L. J. Hendren. Supporting Dynamic Data Structures on Distributed-Memory Machines. ACM Transactions on Programming Languages and Systems, 17(2):233- 263, 1995.
-
(1995)
ACM Transactions on Programming Languages and Systems
, vol.17
, Issue.2
, pp. 233-263
-
-
Rogers, A.1
Carlisle, M.C.2
Reppy, J.H.3
Hendren, L.J.4
-
43
-
-
84869537787
-
-
SoftBound website. http://www.cis.upenn.edu/acg/softbound/.
-
SoftBound website
-
-
|