-
2
-
-
70350068208
-
-
Aleph One, Smashing The Stack For Fun and Profit, Phrack Seven, Issue Forty-Nine, July 2003.
-
Aleph One, "Smashing The Stack For Fun and Profit," Phrack Volume Seven, Issue Forty-Nine, July 2003.
-
-
-
-
5
-
-
0034448902
-
ABCD: Eliminating Array Bounds Checks on Demand
-
R. Bodik, R. Gupta, and V. Sarkar, "ABCD: Eliminating Array Bounds Checks on Demand," Proc. of PLDI, 2000.
-
(2000)
Proc. of PLDI
-
-
Bodik, R.1
Gupta, R.2
Sarkar, V.3
-
6
-
-
70350052931
-
-
D. Burger and T. M. Austin, The SimpleScalar Tool Set, Version 2.0, Computer Arch. News. 1997
-
D. Burger and T. M. Austin, "The SimpleScalar Tool Set, Version 2.0," Computer Arch. News. 1997.
-
-
-
-
7
-
-
0003741020
-
Olden: Parallelizing Programs with Dynamic Data Structures on Distributed-Memory Machines,
-
PhD Thesis, Princeton University Department of Computer Science, June
-
M. Carlisle, "Olden: Parallelizing Programs with Dynamic Data Structures on Distributed-Memory Machines," PhD Thesis, Princeton University Department of Computer Science, June 1996.
-
(1996)
-
-
Carlisle, M.1
-
8
-
-
70350074437
-
-
Checker. http://www.gnu.org/software/checker/checker.html
-
Checker
-
-
-
10
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
J. Chow, et al., "Understanding data lifetime via whole system simulation," In Proc. of the USENIX Security Symp, 2004.
-
(2004)
Proc. of the USENIX Security Symp
-
-
Chow, J.1
-
11
-
-
85084160243
-
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
-
C. Cowan, et al., "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks," Proc. USENIX Security Conf., 1998.
-
(1998)
Proc. USENIX Security Conf
-
-
Cowan, C.1
-
12
-
-
33646073635
-
Minos: Control data attack prevention orthogonal to memory model
-
J. R. Crandall and F. T. Chong, "Minos: Control data attack prevention orthogonal to memory model," In Proc. Micro, 2004.
-
(2004)
Proc. Micro
-
-
Crandall, J.R.1
Chong, F.T.2
-
13
-
-
35348907867
-
Raksha: A flexible informatin flow architecture for software security
-
M. Dalton, et al., "Raksha: A flexible informatin flow architecture for software security," Proc. ISCA, 2007.
-
(2007)
Proc. ISCA
-
-
Dalton, M.1
-
14
-
-
42149150286
-
-
D. Dhurjati, et al., Memory safety without garbage collection for embedded applications, ACM Trans. on Embedded Computing Sys, Feb. 2005.
-
D. Dhurjati, et al., "Memory safety without garbage collection for embedded applications," ACM Trans. on Embedded Computing Sys, Feb. 2005.
-
-
-
-
15
-
-
34247170052
-
Backwards-Compatible Array Bounds Checking for C with Very Low Overhead
-
ICSE
-
D. Dhurjati and V. Adve, "Backwards-Compatible Array Bounds Checking for C with Very Low Overhead," Proc. Int'l Conf. on Software Engineering (ICSE), 2006.
-
(2006)
Proc. Int'l Conf. on Software Engineering
-
-
Dhurjati, D.1
Adve, V.2
-
16
-
-
0037702242
-
CSSV: Towards a Realistic Tool for Statically Detecting All Buffer Overflows in C
-
N. Dor, M. Rodeh, and M. Sagiv, "CSSV: Towards a Realistic Tool for Statically Detecting All Buffer Overflows in C," Proc. PLDI, 2003.
-
(2003)
Proc. PLDI
-
-
Dor, N.1
Rodeh, M.2
Sagiv, M.3
-
17
-
-
3142582577
-
Buffer overrun detection using linear programming and static analysis
-
Sec
-
V. Ganapathy, et al., "Buffer overrun detection using linear programming and static analysis," Proc. ACM Conf. on Comp. and Comm. Sec., 2003.
-
(2003)
Proc. ACM Conf. on Comp. and Comm
-
-
Ganapathy, V.1
-
20
-
-
70350041682
-
-
iSec Security Research
-
iSec Security Research: Vulnerabilities 2004. http://www.isec.pl/ vulnerabilities04.html
-
(2004)
Vulnerabilities
-
-
-
23
-
-
70350061876
-
Efficient Dynamic Detection of Input Related Software Errors,
-
PhD Dissertation, University of Michigan
-
E. Larson, "Efficient Dynamic Detection of Input Related Software Errors," PhD Dissertation, University of Michigan, 2004.
-
(2004)
-
-
Larson, E.1
-
25
-
-
70350059972
-
-
MS TechNet Security, http://www.microsoft.com/technet/Security/default. mspx
-
MS TechNet Security
-
-
-
26
-
-
70350059273
-
-
MITRE Corporation. CAN-2004-0416. Common Vulnerabilities and Exposures (CVE) (cve.mitre.org), 2004.
-
MITRE Corporation. CAN-2004-0416. Common Vulnerabilities and Exposures (CVE) (cve.mitre.org), 2004.
-
-
-
-
27
-
-
70350061873
-
-
National Institute of Standards and Technology (NIST), Department of Commerce, Software errors cost U.S. economy $59.5 billion annually, NIST News Release 2002-10, June 2002.
-
National Institute of Standards and Technology (NIST), Department of Commerce, "Software errors cost U.S. economy $59.5 billion annually," NIST News Release 2002-10, June 2002.
-
-
-
-
29
-
-
8344281803
-
-
B. Perens. Electric Fence. http://sunsite.unc.edu/pub/Linux/devel/lang/c/ ElectricFence.2.0.5.tar.gz
-
Electric Fence
-
-
Perens, B.1
-
31
-
-
36448995534
-
RIFLE: An architectural framework for usercentric information-flow security
-
N. Vachharajani, et al., "RIFLE: An architectural framework for usercentric information-flow security," In Proc. Micro, 2004.
-
(2004)
Proc. Micro
-
-
Vachharajani, N.1
-
32
-
-
70350077617
-
-
Valgrind. http://valgrind.kde.org.
-
Valgrind
-
-
-
33
-
-
77954524963
-
ARCHER: Using Symbolic, Path-sensitive Analysis to Detect Memory Access Errors
-
Sep
-
Y. Xie, A. Chou, D. Engler, "ARCHER: Using Symbolic, Path-sensitive Analysis to Detect Memory Access Errors," Proc. of 11th International Symposium on the Foundations of Software Engineering, Sep. 2003.
-
(2003)
Proc. of 11th International Symposium on the Foundations of Software Engineering
-
-
Xie, Y.1
Chou, A.2
Engler, D.3
-
34
-
-
70350064241
-
-
W. Xu, et al, An efficient and backwards-compatible transformation to ensure memory safety of c programs, Proc. Symp. on Foundations of Software Engineering
-
W. Xu, et al., "An efficient and backwards-compatible transformation to ensure memory safety of c programs," Proc. Symp. on Foundations of Software Engineering, 2004.
-
(2004)
-
-
-
35
-
-
77954512971
-
Protecting C programs from attacks via invalid pointer dereferences
-
S. Yong and S. Horwitz, "Protecting C programs from attacks via invalid pointer dereferences," In Foundations of Software Engineering, 2003.
-
(2003)
Foundations of Software Engineering
-
-
Yong, S.1
Horwitz, S.2
-
36
-
-
70350050967
-
-
http://www.mcafee.com/us/local-content/white-papers/wp- ricochetbriefbuffer.pdf
-
-
-
-
37
-
-
84864852042
-
Hardbound: Architectural Support for Spatial Safety of the C Programming Language
-
J. Devietti, et al. "Hardbound: Architectural Support for Spatial Safety of the C Programming Language," Proc. ASPLOS 2008.
-
(2008)
Proc. ASPLOS
-
-
Devietti, J.1
|