-
1
-
-
0026153167
-
An execution-backtracking approach to debugging
-
H. Agrawal, R. A. DeMillo, and E. H. Spafford. An execution-backtracking approach to debugging. IEEE Software., 8(3):21-26, 1991.
-
(1991)
IEEE Software
, vol.8
, Issue.3
, pp. 21-26
-
-
Agrawal, H.1
DeMillo, R.A.2
Spafford, E.H.3
-
2
-
-
0034501876
-
Windows of vulnerability: A case study analysis
-
W. A. Arbaugh, W. L. Fithen, and J. McHugh. Windows of vulnerability: A case study analysis. Computer, 33 (12):52-59, 2000.
-
(2000)
Computer
, vol.33
, Issue.12
, pp. 52-59
-
-
Arbaugh, W.A.1
Fithen, W.L.2
McHugh, J.3
-
3
-
-
0034442456
-
Hoard: A scalable memory allocator for multithreaded applications
-
E. D. Berger, K. S. McKinley, R. D. Blumofe, and P. R. Wilson. Hoard: A scalable memory allocator for multithreaded applications. In Proceedings of Intl. Conf. on Architectural support for programming languages and operating systems (ASPLOS'00), pages 117-128, 2000.
-
(2000)
Proceedings of Intl. Conf. on Architectural support for programming languages and operating systems (ASPLOS'00)
, pp. 117-128
-
-
Berger, E.D.1
McKinley, K.S.2
Blumofe, R.D.3
Wilson, P.R.4
-
6
-
-
63549090530
-
Tolerating memory leaks
-
Oct
-
M. D. Bond and K. S. McKinley. Tolerating memory leaks. In Proceedings of Intl. Conf. on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA '08), pages 109-126, Oct. 2008.
-
(2008)
Proceedings of Intl. Conf. on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA '08)
, pp. 109-126
-
-
Bond, M.D.1
McKinley, K.S.2
-
7
-
-
35048885595
-
Creating vulnerability signatures using weakest pre-conditions
-
Venice, Italy
-
D. Brumley, H. Wang, S. Jha, and D. Song. Creating vulnerability signatures using weakest pre-conditions. In Proceedings of Computer Security Foundations Symposium (CSF'07), pages 311-325, Venice, Italy, 2007.
-
(2007)
Proceedings of Computer Security Foundations Symposium (CSF'07)
, pp. 311-325
-
-
Brumley, D.1
Wang, H.2
Jha, S.3
Song, D.4
-
8
-
-
0036926472
-
Reducing recovery time in a small recursively restartable system
-
G. Candea, J. Cutler, A. Fox, R. Doshi, P. Garg, and R. Gowda. Reducing recovery time in a small recursively restartable system. In Proceedings of Intl. Conf. on Dependable Systems and Networks (DSN'02), pages 605-614, 2002.
-
(2002)
Proceedings of Intl. Conf. on Dependable Systems and Networks (DSN'02)
, pp. 605-614
-
-
Candea, G.1
Cutler, J.2
Fox, A.3
Doshi, R.4
Garg, P.5
Gowda, R.6
-
9
-
-
80053199674
-
Microreboot - A technique for cheap recovery
-
G. Candea, S. Kawamoto, Y. Fujiki, G. Friedman, and A. Fox. Microreboot - A technique for cheap recovery. In Proceedings of Symposium on Operating System Design and Implementation (OSDI'04), pages 31-44, 2004.
-
(2004)
Proceedings of Symposium on Operating System Design and Implementation (OSDI'04)
, pp. 31-44
-
-
Candea, G.1
Kawamoto, S.2
Fujiki, Y.3
Friedman, G.4
Fox, A.5
-
10
-
-
70450092967
-
Bouncer: Securing software by blocking bad input
-
M. Costa, M. Castro, L. Zhou, L. Zhang, and M. Peinado. Bouncer: Securing software by blocking bad input. In Proceedings of ACM SIGOPS symposium on Operating systems principles (SOSP'07), pages 117-130, 2007.
-
(2007)
Proceedings of ACM SIGOPS symposium on Operating systems principles (SOSP'07)
, pp. 117-130
-
-
Costa, M.1
Castro, M.2
Zhou, L.3
Zhang, L.4
Peinado, M.5
-
11
-
-
85065163256
-
Remus: High availability via asynchronous virtual machine replication
-
Apr
-
B. Cully, G. Lefebvre, D. T. Meyer, A. Karollil, M. J. Feeley, N. C. Hutchinson, and A. Warfield. Remus: High availability via asynchronous virtual machine replication. In Proceedings of Symposium on Networked Systems Design and Implementation (NSDI'08), pages 161-174, Apr 2008.
-
(2008)
Proceedings of Symposium on Networked Systems Design and Implementation (NSDI'08)
, pp. 161-174
-
-
Cully, B.1
Lefebvre, G.2
Meyer, D.T.3
Karollil, A.4
Feeley, M.J.5
Hutchinson, N.C.6
Warfield, A.7
-
12
-
-
0030685484
-
On the analysis of software rejuvenation policies
-
S. Garg, A. Puliaflto, M. Telek, and K. S. Trivedi. On the analysis of software rejuvenation policies. In Proceedings of the Annual Conference on Computer Assurance (CA'97), pages 88-96, 1997.
-
(1997)
Proceedings of the Annual Conference on Computer Assurance (CA'97)
, pp. 88-96
-
-
Garg, S.1
Puliaflto, A.2
Telek, M.3
Trivedi, K.S.4
-
13
-
-
70349087436
-
-
GNU. Gdb: The GNU project debugger
-
GNU. Gdb: The GNU project debugger.
-
-
-
-
15
-
-
1542359963
-
Characterization of Linux kernel behavior under errors
-
Jun
-
W. Gu, Z. Kalbarczyk, R. K. Iyer, and Z. Yang. Characterization of Linux kernel behavior under errors. In Proceedings of Intl. Conf. on Dependable Systems and Networks (DSN'03), pages 459-468, Jun 2003.
-
(2003)
Proceedings of Intl. Conf. on Dependable Systems and Networks (DSN'03)
, pp. 459-468
-
-
Gu, W.1
Kalbarczyk, Z.2
Iyer, R.K.3
Yang, Z.4
-
17
-
-
0028994247
-
Software rejuvenation: Analysis, module and applications
-
Jun
-
Y. Huang, C. Kintala, N. Kolettis, and N. D. Fulton. Software rejuvenation: Analysis, module and applications. In Proceedings of International Symposium on Fault-Tolerant Computing (FTC'95), pages 381-390, Jun 1995.
-
(1995)
Proceedings of International Symposium on Fault-Tolerant Computing (FTC'95)
, pp. 381-390
-
-
Huang, Y.1
Kintala, C.2
Kolettis, N.3
Fulton, N.D.4
-
18
-
-
85076901048
-
Deadlock immunity: Enabling systems to defend against deadlocks
-
Dec
-
H. Jula, D. Tralamazza, C. Zamflr, and G. Candea. Deadlock immunity: Enabling systems to defend against deadlocks. In Proceedings of Symposium on Operating System Design and Implementation (OSDI'08), pages 295-308, Dec 2008.
-
(2008)
Proceedings of Symposium on Operating System Design and Implementation (OSDI'08)
, pp. 295-308
-
-
Jula, H.1
Tralamazza, D.2
Zamflr, C.3
Candea, G.4
-
21
-
-
0012991080
-
Discount checking: Transparent, low-overhead recovery for general applications
-
Technical report, CSE-TR-410-99, University of Michigan
-
D. E. Lowell and P. M. Chen. Discount checking: Transparent, low-overhead recovery for general applications. Technical report, CSE-TR-410-99, University of Michigan, 1998.
-
(1998)
-
-
Lowell, D.E.1
Chen, P.M.2
-
22
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
C. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood. Pin: Building customized program analysis tools with dynamic instrumentation. In Proceedings of Programming language design and implementation (PLDI'05), pages 190-200, 2005.
-
(2005)
Proceedings of Programming language design and implementation (PLDI'05)
, pp. 190-200
-
-
Luk, C.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
23
-
-
77957777343
-
Archipelago: Trading address space for reliability and security
-
V. B. Lvin, G. Novark, E. D. Berger, and B. G. Zorn. Archipelago: Trading address space for reliability and security. In Proceedings of Intl. Conf. on Architectural support for programming languages and operating systems (ASPLOS'08), pages 115-124, 2008.
-
(2008)
Proceedings of Intl. Conf. on Architectural support for programming languages and operating systems (ASPLOS'08)
, pp. 115-124
-
-
Lvin, V.B.1
Novark, G.2
Berger, E.D.3
Zorn, B.G.4
-
24
-
-
34247107486
-
-
G. Misherghi and Z. Su. HDD: Hierarchical delta debugging. In Proceedings of the Intl. Conf. on Software engineering (ICSE'06), pages 142-151, 2006.
-
G. Misherghi and Z. Su. HDD: Hierarchical delta debugging. In Proceedings of the Intl. Conf. on Software engineering (ICSE'06), pages 142-151, 2006.
-
-
-
-
27
-
-
84978437417
-
The design and implementation of Zap: A system for migrating computing environments
-
S. Osman, D. Subhraveti, G. Su, and J. Nieh. The design and implementation of Zap: A system for migrating computing environments. In Symposium on Operating systems design and implementation (OSDI'02), pages 361-376, 2002.
-
(2002)
Symposium on Operating systems design and implementation (OSDI'02)
, pp. 361-376
-
-
Osman, S.1
Subhraveti, D.2
Su, G.3
Nieh, J.4
-
28
-
-
85084159983
-
-
J. S. Plank, M. Beck, G. Kingsley, and K. Li. Libckpt: Transparent checkpointing under Unix. In Usenix Winter Technical Conference, pages 213-224, January 1995.
-
J. S. Plank, M. Beck, G. Kingsley, and K. Li. Libckpt: Transparent checkpointing under Unix. In Usenix Winter Technical Conference, pages 213-224, January 1995.
-
-
-
-
30
-
-
84885578759
-
Rx: Treating bugs as allergies - a safe method to survive software failure
-
Oct
-
F. Qin, J. Tucek, J. Sundaresan, and Y Zhou. Rx: Treating bugs as allergies - a safe method to survive software failure. In Proceedings of ACM Symposium on Operating System Principles (SOSP'05), pages 235-248, Oct 2005.
-
(2005)
Proceedings of ACM Symposium on Operating System Principles (SOSP'05)
, pp. 235-248
-
-
Qin, F.1
Tucek, J.2
Sundaresan, J.3
Zhou, Y.4
-
31
-
-
84906487819
-
Enhancing server availability and security through failure-oblivious computing
-
Dec
-
M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and W. S. Beebee. Enhancing server availability and security through failure-oblivious computing. In Proceedings of Symposium on Operating System Design and Implementation (OSDI '04), pages 21-21, Dec 2004.
-
(2004)
Proceedings of Symposium on Operating System Design and Implementation (OSDI '04)
, pp. 21-21
-
-
Rinard, M.1
Cadar, C.2
Dumitran, D.3
Roy, D.M.4
Leu, T.5
Beebee, W.S.6
-
32
-
-
84906497159
-
Building a reactive immune system for software services
-
S. Sidiroglou, M. E. Locasto, S. W. Boyd, and A. D. Keromytis. Building a reactive immune system for software services. In Proceedings of USENIX Annual Technical Conference (USENIX'05), pages 149-161, 2005.
-
(2005)
Proceedings of USENIX Annual Technical Conference (USENIX'05)
, pp. 149-161
-
-
Sidiroglou, S.1
Locasto, M.E.2
Boyd, S.W.3
Keromytis, A.D.4
-
33
-
-
70349140656
-
-
SPEC. http://www.spec.org/cpu2000.
-
SPEC. http://www.spec.org/cpu2000.
-
-
-
-
34
-
-
79959917961
-
Flashback: A light-weight extension for rollback and deterministic replay for software debugging
-
Jun
-
S. Srinivasan, C. Andrews, S. Kandula, and Y Zhou. Flashback: A light-weight extension for rollback and deterministic replay for software debugging. In Proceedings of the USENIX 2004 Annual Technical Conference (USENIX'04), pages 29-44, Jun 2004.
-
(2004)
Proceedings of the USENIX 2004 Annual Technical Conference (USENIX'04)
, pp. 29-44
-
-
Srinivasan, S.1
Andrews, C.2
Kandula, S.3
Zhou, Y.4
-
38
-
-
50649093917
-
Triage: Diagnosing production run failures at the user's site
-
J. Tucek, S. Lu, C. Huang, S. Xanthos, and Y Zhou. Triage: Diagnosing production run failures at the user's site. In Proceedings of Symposium on Operating systems principles (SOSP'07), pages 131-144, 2007.
-
(2007)
Proceedings of Symposium on Operating systems principles (SOSP'07)
, pp. 131-144
-
-
Tucek, J.1
Lu, S.2
Huang, C.3
Xanthos, S.4
Zhou, Y.5
-
39
-
-
34548043748
-
Sweeper: A lightweight end-to-end system for defending against fast worms
-
J. Tucek, J. Newsome, S. Lu, C. Huang, S. Xanthos, D. Brumley, Y Zhou, and D. Song. Sweeper: A lightweight end-to-end system for defending against fast worms. In Proceedings of 2007 EuroSys Conference, pages 115-128, 2007.
-
(2007)
Proceedings of 2007 EuroSys Conference
, pp. 115-128
-
-
Tucek, J.1
Newsome, J.2
Lu, S.3
Huang, C.4
Xanthos, S.5
Brumley, D.6
Zhou, Y.7
Song, D.8
-
40
-
-
70349107340
-
-
US-CERT. US-CERT vulnerability notes database. http://www.kb.cert.org/ vuls.
-
US-CERT. US-CERT vulnerability notes database. http://www.kb.cert.org/ vuls.
-
-
-
-
41
-
-
0020157396
-
Programmers use slices when debugging
-
M. Weiser. Programmers use slices when debugging. ACM Commun., 25(7):446-452, 1982.
-
(1982)
ACM Commun
, vol.25
, Issue.7
, pp. 446-452
-
-
Weiser, M.1
-
44
-
-
21644447484
-
AccMon: Automatically detecting memory-related bugs via program counter-based invariants
-
P. Zhou, W. Liu, L. Fei, S. Lu, F. Qin, Y Zhou, S. Midkiff, and J. Torrellas. AccMon: Automatically detecting memory-related bugs via program counter-based invariants. In Proceedings of IEEE/ACM International Symposium on Mi-croarchitecture (MICRO'04), pages 269-280, 2004.
-
(2004)
Proceedings of IEEE/ACM International Symposium on Mi-croarchitecture (MICRO'04)
, pp. 269-280
-
-
Zhou, P.1
Liu, W.2
Fei, L.3
Lu, S.4
Qin, F.5
Zhou, Y.6
Midkiff, S.7
Torrellas, J.8
|