-
1
-
-
70450255931
-
-
mysql bug. bugs.mysql.com/bug.php?id=110.
-
mysql bug. bugs.mysql.com/bug.php?id=110.
-
-
-
-
2
-
-
70450268276
-
-
National vulnerability database
-
National vulnerability database. http://nvd.nist.gov/statistics.cfm.
-
-
-
-
3
-
-
84943422723
-
-
Derek Bruening, Timothy Garnett, and Saman Amarasinghe. An infrastructure for adaptive dynamic optimization. In CGO, pages 265-275. IEEE Computer Society, 2003.
-
Derek Bruening, Timothy Garnett, and Saman Amarasinghe. An infrastructure for adaptive dynamic optimization. In CGO, pages 265-275. IEEE Computer Society, 2003.
-
-
-
-
4
-
-
80053199674
-
Microreboot - a technique for cheap recovery
-
George Candea, Shinichi Kawamoto, Yuichi Fujiki, Greg Friedman, and Armando Fox. Microreboot - a technique for cheap recovery. In OSDI, pages 31-44, 2004.
-
(2004)
OSDI
, pp. 31-44
-
-
Candea, G.1
Kawamoto, S.2
Fujiki, Y.3
Friedman, G.4
Fox, A.5
-
5
-
-
34547335786
-
Tainttrace: Efficient flow tracing with dynamic binary rewriting
-
Winnie Cheng, Qin Zhao, Bei Yu, and Scott Hiroshige. Tainttrace: Efficient flow tracing with dynamic binary rewriting. ISCC, pages 749-754,2006.
-
(2006)
ISCC
, pp. 749-754
-
-
Cheng, W.1
Zhao, Q.2
Yu, B.3
Hiroshige, S.4
-
6
-
-
57749185043
-
Thread-safe binary translation using transactional memory
-
JaeWoong Chung, Michael Dalton, Hari Kannan, and Christos Kozyrakis. Thread-safe binary translation using transactional memory. In HPCA, 2008.
-
(2008)
HPCA
-
-
Chung, J.1
Dalton, M.2
Kannan, H.3
Kozyrakis, C.4
-
7
-
-
85017025817
-
Felix Wu, and Frederic T Chong. Minos: Architectural support for protecting control data
-
359-389
-
Jedidiah R. Crandall, S. Felix Wu, and Frederic T Chong. Minos: Architectural support for protecting control data. ACM Trans. Archit. Code Optim., 3(4):359-389, 2006.
-
(2006)
ACM Trans. Archit. Code Optim
, vol.3
, Issue.4
-
-
Jedidiah, R.1
Crandall, S.2
-
8
-
-
35348907867
-
Raksha: A flexible information flow architecture for software security
-
Michael Dalton, Hari Kannan, and Christos Kozyrakis. Raksha: a flexible information flow architecture for software security. In ISCA, pages 482-493, 2007.
-
(2007)
ISCA
, pp. 482-493
-
-
Dalton, M.1
Kannan, H.2
Kozyrakis, C.3
-
10
-
-
36549014520
-
Bugbench: A benchmark for evaluating bug detection tools
-
Shan Lu, Zhenmin Li, Feng Qin, Lin Tan, Pin Zhou, and Yuanyuan Zhou. Bugbench: A benchmark for evaluating bug detection tools. In Bugs, 2005.
-
(2005)
Bugs
-
-
Lu, S.1
Li, Z.2
Qin, F.3
Tan, L.4
Zhou, P.5
Zhou, Y.6
-
11
-
-
28444483117
-
The soft error problem: An architectural perspective
-
Shubhendu S. Mukherjee, Joel S. Emer, and Steven K. Reinhardt. The soft error problem: An architectural perspective. In HPCA, pages 243-247, 2005.
-
(2005)
HPCA
, pp. 243-247
-
-
Mukherjee, S.S.1
Emer, J.S.2
Reinhardt, S.K.3
-
12
-
-
67650081268
-
Architectural support for shadow memory in multiprocessors
-
Vijay Nagarajan and Rajiv Gupta. Architectural support for shadow memory in multiprocessors. In VEE, pages 1-10, 2009.
-
(2009)
VEE
, pp. 1-10
-
-
Nagarajan, V.1
Gupta, R.2
-
13
-
-
35448963872
-
How to shadow every byte of memory used by a program
-
Nicholas Nethercote and Julian Seward. How to shadow every byte of memory used by a program. In VEE, pages 65-74, 2007a.
-
(2007)
VEE
, pp. 65-74
-
-
Nethercote, N.1
Seward, J.2
-
14
-
-
35448955692
-
Valgrind: A framework for heavyweight dynamic binary instrumentation
-
Nicholas Nethercote and Julian Seward. Valgrind: a framework for heavyweight dynamic binary instrumentation. In PLDI, pages 89-100, 2007b.
-
(2007)
PLDI
, pp. 89-100
-
-
Nethercote, N.1
Seward, J.2
-
15
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
James Newsome and Dawn Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, 2005.
-
(2005)
NDSS
-
-
Newsome, J.1
Song, D.2
-
16
-
-
0036472436
-
Roc-1: Hardware support for recovery-oriented computing
-
David L. Oppenheimer, Aaron B. Brown, James Beck, Daniel Hettena, Jon Kuroda, Noah Treuhaft, David A. Patterson, and Katherine A. Yelick. Roc-1: Hardware support for recovery-oriented computing. IEEE Trans. Computers, 51(2):100-107, 2002.
-
(2002)
IEEE Trans. Computers
, vol.51
, Issue.2
, pp. 100-107
-
-
Oppenheimer, D.L.1
Brown, A.B.2
Beck, J.3
Hettena, D.4
Kuroda, J.5
Treuhaft, N.6
Patterson, D.A.7
Yelick, K.A.8
-
17
-
-
77954568726
-
Recovery oriented computing: A new research agenda for a new century
-
David A. Patterson. Recovery oriented computing: A new research agenda for a new century. In HPCA, page 247, 2002.
-
(2002)
HPCA
, pp. 247
-
-
Patterson, D.A.1
-
18
-
-
0032179680
-
Diskless checkpointing
-
James S. Plank, Kai Li, and Michael A. Puening. Diskless checkpointing. IEEE Trans. Parallel Distrib. Syst., 9(10):972-986,1998.
-
(1998)
IEEE Trans. Parallel Distrib. Syst
, vol.9
, Issue.10
, pp. 972-986
-
-
Plank, J.S.1
Li, K.2
Puening, M.A.3
-
19
-
-
33845429905
-
Rx: Treating bugs as allergies - a safe method to survive software failures
-
Feng Qin, Joseph Tucek, Jagadeesan Sundaresan, and Yuanyuan Zhou. Rx: treating bugs as allergies - a safe method to survive software failures. In SOSP, pages 235-248, 2005.
-
(2005)
SOSP
, pp. 235-248
-
-
Qin, F.1
Tucek, J.2
Sundaresan, J.3
Zhou, Y.4
-
20
-
-
40349087553
-
Ho seop Kim, Yuanyuan Zhou, and Youfeng Wu. Lift: A low-overhead practical information flow tracking system for detecting security attacks
-
Feng Qin, Cheng Wang, Zhenmin Li, Ho seop Kim, Yuanyuan Zhou, and Youfeng Wu. Lift: A low-overhead practical information flow tracking system for detecting security attacks. In MICRO 39, pages 135-148, 2006.
-
(2006)
MICRO 39
, pp. 135-148
-
-
Qin, F.1
Wang, C.2
Li, Z.3
-
21
-
-
0017983255
-
Reliability issues in computing system design
-
Brian Randell, P. A. Lee, and Philip C. Treleaven. Reliability issues in computing system design. ACM Comput. Surv., 10(2):123-165,1978.
-
(1978)
ACM Comput. Surv
, vol.10
, Issue.2
, pp. 123-165
-
-
Brian Randell, P.A.L.1
Treleaven, P.C.2
-
22
-
-
0033726332
-
Transient fault detection via simultaneous multithreading
-
Steven K. Reinhardt and Shubhendu S. Mukherjee. Transient fault detection via simultaneous multithreading. In ISCA, pages 25-36, 2000.
-
(2000)
ISCA
, pp. 25-36
-
-
Reinhardt, S.K.1
Mukherjee, S.S.2
-
23
-
-
33646829087
-
Swift: Software implemented fault tolerance
-
George A. Reis, Jonathan Chang, Neil Vachharajani, Ram Rangan, and David I. August. Swift: Software implemented fault tolerance. In CGO, pages 243-254, 2005.
-
(2005)
CGO
, pp. 243-254
-
-
Reis, G.A.1
Chang, J.2
Vachharajani, N.3
Rangan, R.4
August, D.I.5
-
24
-
-
84906487819
-
Enhancing server availability and security through failure-oblivious computing
-
Martin C. Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy, Tudor Leu, and William S. Beebee. Enhancing server availability and security through failure-oblivious computing. In OSDI, pages 303-316, 2004.
-
(2004)
OSDI
, pp. 303-316
-
-
Rinard, M.C.1
Cadar, C.2
Dumitran, D.3
Roy, D.M.4
Leu, T.5
Beebee, W.S.6
-
25
-
-
84906497159
-
Building a reactive immune system for software services
-
Stelios Sidiroglou, Michael E. Locasto, Stephen W Boyd, and Angelos D. Keromytis. Building a reactive immune system for software services. In USENIX Annual Technical Conference, General Track, pages 149-161, 2005.
-
(2005)
USENIX Annual Technical Conference, General Track
, pp. 149-161
-
-
Sidiroglou, S.1
Locasto, M.E.2
Boyd, S.W.3
Keromytis, A.D.4
-
26
-
-
79959917961
-
Flashback: A lightweight extension for rollback and deterministic replay for software debugging
-
Sudarshan M. Srinivasan, Srikanth Kandula, Christopher R. Andrews, and Yuanyuan Zhou. Flashback: a lightweight extension for rollback and deterministic replay for software debugging. In ATEC, pages 29-44, 2004.
-
(2004)
ATEC
, pp. 29-44
-
-
Srinivasan, S.M.1
Kandula, S.2
Andrews, C.R.3
Zhou, Y.4
-
27
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
G. Edward Suh, Jae W. Lee, David Zhang, and Srinivas Devadas. Secure program execution via dynamic information flow tracking. In ASPLOS, pages 85-96, 2004.
-
(2004)
ASPLOS
, pp. 85-96
-
-
Edward Suh, G.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
28
-
-
85077022007
-
Recovering device drivers (awarded best paper!)
-
Michael M. Swift, Muthukaruppan Annamalai, Brian N. Bershad, and Henry M. Levy. Recovering device drivers (awarded best paper!). In OSDI, pages 1-16, 2004.
-
(2004)
OSDI
, pp. 1-16
-
-
Swift, M.M.1
Annamalai, M.2
Bershad, B.N.3
Levy, H.M.4
-
29
-
-
21644451622
-
Improving the reliability of commodity operating systems
-
Michael M. Swift, Brian N. Bershad, and Henry M. Levy. Improving the reliability of commodity operating systems. In SOSP, pages 207-222, 2003.
-
(2003)
SOSP
, pp. 207-222
-
-
Swift, M.M.1
Bershad, B.N.2
Levy, H.M.3
-
30
-
-
51949119271
-
Avoiding program failures through safe execution perturbations
-
Sriraman Tallam, Chen Tian, Rajiv Gupta, and Xiangyu Zhang. Avoiding program failures through safe execution perturbations. In COMPSAC, pages 152-159, 2008.
-
(2008)
COMPSAC
, pp. 152-159
-
-
Tallam, S.1
Tian, C.2
Gupta, R.3
Zhang, X.4
-
31
-
-
0036290674
-
Transient-fault recovery using simultaneous multithreading
-
T N. Vijaykumar, Irith Pomeranz, and Karl Cheng. Transient-fault recovery using simultaneous multithreading. In ISCA, pages 87-98, 2002.
-
(2002)
ISCA
, pp. 87-98
-
-
Vijaykumar, T.N.1
Pomeranz, I.2
Cheng, K.3
-
32
-
-
34547655973
-
Compiler-managed software-based redundant multi-threading for transient fault detection
-
Cheng Wang, Ho-Seop Kim, Youfeng Wu, and Victor Ying. Compiler-managed software-based redundant multi-threading for transient fault detection. In CGO, pages 244-258, 2007.
-
(2007)
CGO
, pp. 244-258
-
-
Wang, C.1
Kim, H.-S.2
Wu, Y.3
Ying, V.4
-
33
-
-
34547309741
-
Dynamic slicing long running programs through execution fast forwarding
-
Xiangyu Zhang, Sriraman Tallam, and Rajiv Gupta. Dynamic slicing long running programs through execution fast forwarding. In SIGSOFT '06/FSE-14, pages 81-91, 2006.
-
(2006)
SIGSOFT '06/FSE-14
, pp. 81-91
-
-
Zhang, X.1
Tallam, S.2
Gupta, R.3
|