-
1
-
-
50249149602
-
Preventing memory error exploits with wit
-
IEEE Computer Society
-
AKRITIDIS, P., CADAR, C., RAICIU, C., COSTA, M., AND CASTRO, M. 2008. Preventing memory error exploits with wit. In Proceedings of the IEEE Symposium on Security and Privacy (SP'08). IEEE Computer Society, 263-277.
-
(2008)
Proceedings of the IEEE Symposium on Security and Privacy (SP'08)
, pp. 263-277
-
-
AKRITIDIS, P.1
CADAR, C.2
RAICIU, C.3
COSTA, M.4
CASTRO, M.5
-
2
-
-
84869561909
-
-
BOLETTA, J. 2002. Security Focus Newsletter #172. http://citadelle.intrinsec.com/mailing/current/HTML/ml-securityfocus-news/0067. html.
-
(2002)
Security Focus Newsletter
, Issue.172
-
-
BOLETTA, J.1
-
3
-
-
52649155221
-
Flexible hardware acceleration for instructiongrain program monitoring
-
IEEE Computer Society
-
CHEN, S., KOZUCH, M., STRIGKOS, T., FALSAFI, B., GIBBONS, P. B., MOWRY, T. C., RAMACHANDRAN, V., RUWASE, O., RYAN, M., AND VLACHOS, E. 2008. Flexible hardware acceleration for instructiongrain program monitoring. In Proceedings of the 35th International Symposium on Computer Architecture (ISCA'08). IEEE Computer Society, 377-388.
-
(2008)
Proceedings of the 35th International Symposium on Computer Architecture (ISCA'08)
, pp. 377-388
-
-
CHEN, S.1
KOZUCH, M.2
STRIGKOS, T.3
FALSAFI, B.4
GIBBONS, P.B.5
MOWRY, T.C.6
RAMACHANDRAN, V.7
RUWASE, O.8
RYAN, M.9
VLACHOS, E.10
-
4
-
-
0037669859
-
Dise: A programmable macro engine for customizing applications
-
ACM Press
-
CORLISS, M. L., LEWIS, E. C., AND ROTH, A. 2003. Dise: A programmable macro engine for customizing applications. In Proceedings of the 30th Annual International Symposium on Computer Architecture (ISCA'03). ACM Press, 362-373.
-
(2003)
Proceedings of the 30th Annual International Symposium on Computer Architecture (ISCA'03)
, pp. 362-373
-
-
CORLISS, M.L.1
LEWIS, E.C.2
ROTH, A.3
-
5
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
USENIX Association
-
COWAN, C., PU, C., MAIER, D., WALPOLE, J., BAKKE, P., BEATTIE, S., GRIER, A., WAGLE, P., ZHANG, Q., AND HINTON, H. 1998. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the 7th USENIX Security Conference. USENIX Association, 63-78.
-
(1998)
Proceedings of the 7th USENIX Security Conference
, pp. 63-78
-
-
COWAN, C.1
PU, C.2
MAIER, D.3
WALPOLE, J.4
BAKKE, P.5
BEATTIE, S.6
GRIER, A.7
WAGLE, P.8
ZHANG, Q.9
HINTON, H.10
-
7
-
-
77957771407
-
Hardbound: Architectural support for spatial safety of the c programming language
-
DEVIETTI, J., BLUNDELL, C., MARTIN, M. M. K., AND ZDANCEWIC, S. 2008. Hardbound: Architectural support for spatial safety of the c programming language. SIGARCH Comput. Archit. News 36, 1, 103-114.
-
(2008)
SIGARCH Comput. Archit. News
, vol.36
, Issue.1
, pp. 103-114
-
-
DEVIETTI, J.1
BLUNDELL, C.2
MARTIN, M.M.K.3
ZDANCEWIC, S.4
-
8
-
-
0003278283
-
The micro-architecture of the Pentium 4 Processor
-
First Quarter
-
HINTON, G., SAGER, D., UPTON, M., BOGGS, D., CARMEAN, D., KYKER, A., AND ROUSSEL, P. 2001. The micro-architecture of the Pentium 4 Processor. Intel. Tech. J. First Quarter.
-
(2001)
Intel. Tech. J
-
-
HINTON, G.1
SAGER, D.2
UPTON, M.3
BOGGS, D.4
CARMEAN, D.5
KYKER, A.6
ROUSSEL, P.7
-
9
-
-
34547234339
-
-
IBM CORPORATION
-
IBM CORPORATION. 2005. IBM Rational Purify. http://www.ibm.com/ software/awdtools/purify/.
-
(2005)
IBM Rational Purify
-
-
-
15
-
-
28444490333
-
SafeMem: Exploiting ECC-memory for detecting memory leaks and memory corruption during production runs
-
IEEE Computer Society
-
QIN, F., LU, S., AND ZHOU, Y. 2005. SafeMem: Exploiting ECC-memory for detecting memory leaks and memory corruption during production runs. In Proceedings of the 11th International Symposium on High-performance Computer Architecture. IEEE Computer Society, 291-302.
-
(2005)
Proceedings of the 11th International Symposium on High-performance Computer Architecture
, pp. 291-302
-
-
QIN, F.1
LU, S.2
ZHOU, Y.3
-
16
-
-
40349087553
-
Lift: A low-overhead practical information flow tracking system for detecting security attacks
-
IEEE Computer Society
-
QIN, F., QIN, F.,WANG, C., LI, Z., SEOP KIM, H., ZHOU, Y.,WU, Y., AND WU, Y. 2006. Lift: A low-overhead practical information flow tracking system for detecting security attacks. In Proceedings of the 39th Annual IEEE/ACM International Symposium on Micro-architecture (MICRO-39). IEEE Computer Society, 135-148.
-
(2006)
Proceedings of the 39th Annual IEEE/ACM International Symposium on Micro-architecture (MICRO-39)
, pp. 135-148
-
-
QIN, F.1
QIN, F.2
WANG, C.3
LI, Z.4
SEOP KIM, H.5
ZHOU, Y.6
WU, Y.7
WU, Y.8
-
17
-
-
68549088027
-
-
RENAU, J. ET AL. 2006. SESC. http://sesc.sourceforge. net.
-
RENAU, J. ET AL. 2006. SESC. http://sesc.sourceforge. net.
-
-
-
-
19
-
-
33646068753
-
Heapmon: A helper-thread approach to programmable, automatic, and low-overhead memory bug detection
-
SHETTY, R., KHARBUTLI, M., SOLIHIN, Y., AND PRVULOVIC, M. 2006. Heapmon: A helper-thread approach to programmable, automatic, and low-overhead memory bug detection. IBM J. Res. Dev. 50, 2/3, 261-275.
-
(2006)
IBM J. Res. Dev
, vol.50
, Issue.2-3
, pp. 261-275
-
-
SHETTY, R.1
KHARBUTLI, M.2
SOLIHIN, Y.3
PRVULOVIC, M.4
-
20
-
-
38549098665
-
Memory centric security architecture
-
SHI, W., LU, C., AND LEE, H.-H. S. 2007. Memory centric security architecture. Trans. Highperform. Embed. Archit. Compilers I 4050, 1, 95-115.
-
(2007)
Trans. Highperform. Embed. Archit. Compilers I 4050
, vol.1
, pp. 95-115
-
-
SHI, W.1
LU, C.2
LEE, H.-H.S.3
-
22
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
ACM
-
SUH, G. E., LEE, J. W., ZHANG, D., AND DEVADAS, S. 2004. Secure program execution via dynamic information flow tracking. In Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-XI). ACM, 85-96.
-
(2004)
Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-XI)
, pp. 85-96
-
-
SUH, G.E.1
LEE, J.W.2
ZHANG, D.3
DEVADAS, S.4
-
24
-
-
84869592624
-
-
US-CERT. 2001. FedCIRC Advisory FA-2001-19 "code red" worm exploiting buffer overflow in IIS indexing service DLL. http://www.us-cert.gov/ federal/archive/advisories/FA-2001-19.html.
-
(2001)
FedCIRC Advisory FA-2001-19 code red
-
-
CERT, U.1
-
26
-
-
68549126209
-
-
VALGRIND DEVELOPERS. 2005. The Valgrind Quick Start Guide. http://valgrind.org/docs/manual/quickstart.html.
-
(2005)
The Valgrind Quick Start Guide
-
-
-
27
-
-
57749197593
-
Flexitaint: A programmable accelerator for dynamic taint propagation
-
IEEE Computer Society
-
VENKATARAMANI, G., DOUDALIS, I., SOLIHIN, Y., AND PRVULOVIC, M. 2008. Flexitaint: A programmable accelerator for dynamic taint propagation. In Proceedings of the IEEE 14th International Symposium on High-performance Computer Architecture (HPCA'08). IEEE Computer Society, 173-184.
-
(2008)
Proceedings of the IEEE 14th International Symposium on High-performance Computer Architecture (HPCA'08)
, pp. 173-184
-
-
VENKATARAMANI, G.1
DOUDALIS, I.2
SOLIHIN, Y.3
PRVULOVIC, M.4
-
28
-
-
34547674949
-
Memtracker: Efficient and programmable support for memory access monitoring and debugging
-
IEEE Computer Society
-
VENKATARAMANI, G., ROEMER, B., SOLIHIN, Y., AND PRVULOVIC, M. 2007. Memtracker: Efficient and programmable support for memory access monitoring and debugging. In Proceedings of the IEEE 13th International Symposium on High-performance Computer Architecture (HPCA'07). IEEE Computer Society, 273-284.
-
(2007)
Proceedings of the IEEE 13th International Symposium on High-performance Computer Architecture (HPCA'07)
, pp. 273-284
-
-
VENKATARAMANI, G.1
ROEMER, B.2
SOLIHIN, Y.3
PRVULOVIC, M.4
-
29
-
-
0036957412
-
Mondrian memory protection
-
ACM Press
-
WITCHEL, E., CATES, J., AND ASANOVIC, K. 2002. Mondrian memory protection. In Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X). ACM Press, 304-316.
-
(2002)
Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X)
, pp. 304-316
-
-
WITCHEL, E.1
CATES, J.2
ASANOVIC, K.3
-
30
-
-
0029179077
-
The splash-2 programs: Characterization and methodological considerations
-
ACM
-
WOO, S. C., OHARA, M., TORRIE, E., SINGH, J. P., AND GUPTA, A. 1995. The splash-2 programs: Characterization and methodological considerations. In Proceedings of the 22nd Annual International Symposium on Computer Architecture (ISCA'95). ACM, 24-36.
-
(1995)
Proceedings of the 22nd Annual International Symposium on Computer Architecture (ISCA'95)
, pp. 24-36
-
-
WOO, S.C.1
OHARA, M.2
TORRIE, E.3
SINGH, J.P.4
GUPTA, A.5
-
31
-
-
21644447484
-
Accmon: Automatically detecting memory-related bugs via program counter-based invariants
-
IEEE Computer Society
-
ZHOU, P., LIU, W., FEI, L., LU, S., QIN, F., ZHOU, Y., MIDKIFF, S., AND TORRELLAS, J. 2004. Accmon: Automatically detecting memory-related bugs via program counter-based invariants. In Proceedings of the 37th Annual IEEE/ACM International Symposium on Micro-architecture (MICRO-37). IEEE Computer Society, 269-280.
-
(2004)
Proceedings of the 37th Annual IEEE/ACM International Symposium on Micro-architecture (MICRO-37)
, pp. 269-280
-
-
ZHOU, P.1
LIU, W.2
FEI, L.3
LU, S.4
QIN, F.5
ZHOU, Y.6
MIDKIFF, S.7
TORRELLAS, J.8
-
32
-
-
4644293534
-
-
ZHOU, P., QIN, F., LIU, W., ZHOU, Y., AND TORRELLAS, J. 2004. iwatcher: Efficient architectural support for software debugging. In Proceedings of the 31st Annual International Symposium on Computer Architecture (ISCA'04). IEEE Computer Society, 224.
-
ZHOU, P., QIN, F., LIU, W., ZHOU, Y., AND TORRELLAS, J. 2004. iwatcher: Efficient architectural support for software debugging. In Proceedings of the 31st Annual International Symposium on Computer Architecture (ISCA'04). IEEE Computer Society, 224.
-
-
-
-
33
-
-
34547197629
-
Efficient and flexible architectural support for dynamic monitoring
-
ZHOU, Y., ZHOU, P., QIN, F., LIU, W., AND TORRELLAS, J. 2005. Efficient and flexible architectural support for dynamic monitoring. ACM Trans. Archit. Code Optim. 2, 1, 3-33.
-
(2005)
ACM Trans. Archit. Code Optim. 2
, vol.1
, pp. 3-33
-
-
ZHOU, Y.1
ZHOU, P.2
QIN, F.3
LIU, W.4
TORRELLAS, J.5
|