-
1
-
-
33646767376
-
Control-flow integrity: Principles, implementations, and applications
-
Abadi, Budiu, Erlingsson, and Ligatti, "Control-flow integrity: Principles, implementations, and applications," in CCS'05, 2005.
-
(2005)
CCS'05
-
-
Abadi1
Budiu2
Erlingsson3
Ligatti4
-
3
-
-
84976789801
-
The recovery box: Using fast recovery to provide high availability in the UNIX environment
-
M. Baker and M. Sullivan, "The recovery box: Using fast recovery to provide high availability in the UNIX environment," in USENIX'92, 1992, pp. 31-44.
-
(1992)
USENIX'92
, pp. 31-44
-
-
Baker, M.1
Sullivan, M.2
-
4
-
-
0038147962
-
Reconsidering custom memory allocation
-
E. Berger, B. Zorn, and K. McKinley, "Reconsidering custom memory allocation," in Proceedings of the Conference on Object-Oriented Programming: Systems, Languages, and Applications (OOPSLA) 2002., 2002.
-
Proceedings of the Conference on Object-Oriented Programming: Systems, Languages, and Applications (OOPSLA) 2002., 2002
-
-
Berger, E.1
Zorn, B.2
McKinley, K.3
-
5
-
-
33746101822
-
DieHard: Probabilistic memory safety for unsafe languages
-
New York, NY, USA: ACM Press
-
E. D. Berger and B. G. Zorn, "DieHard: probabilistic memory safety for unsafe languages," in PLDI '06. New York, NY, USA: ACM Press, 2006, pp. 158-168.
-
(2006)
PLDI '06
, pp. 158-168
-
-
Berger, E.D.1
Zorn, B.G.2
-
6
-
-
18844446201
-
Composing high-performance memory allocators
-
E. D. Berger, B. G. Zorn, and K. S. McKinley, "Composing high-performance memory allocators," in PLDI'01, 2001, pp. 114-124.
-
(2001)
PLDI'01
, pp. 114-124
-
-
Berger, E.D.1
Zorn, B.G.2
McKinley, K.S.3
-
7
-
-
0028994246
-
On-line error monitoring for several data structures
-
J. D. Bright and G. F. Sullivan, "On-line error monitoring for several data structures," in FTCS, 1995, pp. 392-401.
-
(1995)
FTCS
, pp. 392-401
-
-
Bright, J.D.1
Sullivan, G.F.2
-
8
-
-
0038716438
-
CCured in the real world
-
ACM
-
J. Condit, M. Harren, S. McPeak, G. C. Necula, and W. Weimer, "CCured in the real world," in PLDI. ACM, 2003, pp. 232-244.
-
(2003)
PLDI
, pp. 232-244
-
-
Condit, J.1
Harren, M.2
McPeak, S.3
Necula, G.C.4
Weimer, W.5
-
9
-
-
77954723427
-
-
M. Corporation, [Online]. Available
-
M. Corporation, "Phoenix compiler infrastructure." [Online]. Available: http://research.microsoft.com/phoenix
-
Phoenix Compiler Infrastructure
-
-
-
10
-
-
33947311850
-
Goal-directed reasoning for specification-based data structure repair
-
B. Demsky and M. C. Rinard, "Goal-directed reasoning for specification-based data structure repair," IEEE Trans. Software Eng, vol.32, no.12, pp. 931-951, 2006.
-
(2006)
IEEE Trans. Software Eng
, vol.32
, Issue.12
, pp. 931-951
-
-
Demsky, B.1
Rinard, M.C.2
-
11
-
-
34247170052
-
Backwards-compatible array bounds checking for C with very low overhead
-
ACM
-
D. Dhurjati and V. S. Adve, "Backwards-compatible array bounds checking for C with very low overhead," in ICSE'06. ACM, 2006, pp. 162-171.
-
(2006)
ICSE'06
, pp. 162-171
-
-
Dhurjati, D.1
Adve, V.S.2
-
13
-
-
0034226001
-
SPEC CPU2000: Measuring CPU performance in the new millennium
-
J. L. Henning, "SPEC CPU2000: measuring CPU performance in the new millennium," IEEE Computer, vol.33, no.7, pp. 28-35, 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.7
, pp. 28-35
-
-
Henning, J.L.1
-
14
-
-
0000521033
-
Software fault-tolerance in the application layer
-
M. R. Lyu, Ed. John Wiley & sons
-
Y. Huang and C. Kintala, "Software fault-tolerance in the application layer," in Software Fault Tolerance, M. R. Lyu, Ed. John Wiley & sons, 1995, pp. 231-248.
-
(1995)
Software Fault Tolerance
, pp. 231-248
-
-
Huang, Y.1
Kintala, C.2
-
15
-
-
85084164164
-
Cyclone: A safe dialect of C
-
June
-
T. Jim, J. G. Morrisett, D. Grossman, M. W. Hicks, J. Cheney, and Y. Wang, "Cyclone: A safe dialect of C," in USENIX'02, June 2002, pp. 275-288.
-
(2002)
USENIX'02
, pp. 275-288
-
-
Jim, T.1
Morrisett, J.G.2
Grossman, D.3
Hicks, M.W.4
Cheney, J.5
Wang, Y.6
-
16
-
-
12544250338
-
Backwards-compatible bounds checking for arrays and pointers in C programs
-
R. W. M. Jones and P. H. J. Kelly, "Backwards-compatible bounds checking for arrays and pointers in C programs," in AADEBUG, 1997, pp. 13-26.
-
(1997)
AADEBUG
, pp. 13-26
-
-
Jones, R.W.M.1
Kelly, P.H.J.2
-
18
-
-
0025386926
-
Synthesizing robust data STructures - An introduction
-
K. Kant and A. Ravichandran, "Synthesizing robust data STructures - an introduction," IEEE Trans. Computers, vol.39, no.2, pp. 161-173, 1990.
-
(1990)
IEEE Trans. Computers
, vol.39
, Issue.2
, pp. 161-173
-
-
Kant, K.1
Ravichandran, A.2
-
20
-
-
34547520411
-
Comprehensively and efficiently protecting the heap
-
ACM Press
-
M. Kharbutli, X. Jiang, Y. Solihin, G. Venkataramani, and M. Prvulovic, "Comprehensively and efficiently protecting the heap," in ASPLOS'06. ACM Press, 2006, pp. 207-218.
-
(2006)
ASPLOS'06
, pp. 207-218
-
-
Kharbutli, M.1
Jiang, X.2
Solihin, Y.3
Venkataramani, G.4
Prvulovic, M.5
-
22
-
-
0003438160
-
-
Redwood City, CA, USA: Addison Wesley Longman Publishing Co., Inc.
-
D. R. Musser and A. Saini, The STL Tutorial and Reference Guide: C++ Programming with the Standard Template Library. Redwood City, CA, USA: Addison Wesley Longman Publishing Co., Inc., 1995.
-
(1995)
The STL Tutorial and Reference Guide: C++ Programming with the Standard Template Library
-
-
Musser, D.R.1
Saini, A.2
-
23
-
-
33646032658
-
CCured: Type-safe retrofitting of legacy software
-
G. C. Necula, J. Condit, M. Harren, S. McPeak, and W. Weimer, "CCured: type-safe retrofitting of legacy software," ACM Trans. Program. Lang. Syst, vol.27, no.3, pp. 477-526, 2005.
-
(2005)
ACM Trans. Program. Lang. Syst
, vol.27
, Issue.3
, pp. 477-526
-
-
Necula, G.C.1
Condit, J.2
Harren, M.3
McPeak, S.4
Weimer, W.5
-
26
-
-
84885578759
-
Rx: Treating bugs as allergies - A safe method to survive software failures
-
A. Herbert and K. P. Birman, Eds. ACM
-
F. Qin, J. Tucek, J. Sundaresan, and Y. Zhou, "Rx: treating bugs as allergies - a safe method to survive software failures," in SOSP'05, A. Herbert and K. P. Birman, Eds. ACM, 2005, pp. 235-248.
-
(2005)
SOSP'05
, pp. 235-248
-
-
Qin, F.1
Tucek, J.2
Sundaresan, J.3
Zhou, Y.4
-
27
-
-
21644473822
-
A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors)
-
IEEE Computer Society
-
M. C. Rinard, C. Cadar, D. Dumitran, D. M. Roy, and T. Leu, "A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors)," in ACSAC. IEEE Computer Society, 2004, pp. 82-90.
-
(2004)
ACSAC
, pp. 82-90
-
-
Rinard, M.C.1
Cadar, C.2
Dumitran, D.3
Roy, D.M.4
Leu, T.5
-
28
-
-
0007906701
-
Supporting dynamic data structures on distributed memory machines
-
A. Rogers, M. Carlisle, J. Reppy, and L. Hendren, "Supporting dynamic data structures on distributed memory machines," ACM TOPLAS, vol.13, 1995.
-
(1995)
ACM TOPLAS
, vol.13
-
-
Rogers, A.1
Carlisle, M.2
Reppy, J.3
Hendren, L.4
-
29
-
-
77954504457
-
A practical dynamic buffer overflow detector
-
Feb.
-
O. Ruwase and M. Lam, "A practical dynamic buffer overflow detector," in NDSS'04, Feb. 2004, pp. 159-169.
-
(2004)
NDSS'04
, pp. 159-169
-
-
Ruwase, O.1
Lam, M.2
-
30
-
-
84939437331
-
-
C. C. E. R. Team, [Online]. Available
-
C. C. E. R. Team, "Secure coding." [Online]. Available: http://www.cert.org/secure-coding
-
Secure Coding
-
-
-
31
-
-
0003714241
-
-
New York, NY, USA: John Wiley & Sons, Inc.
-
J. M. Voas and G. McGraw, Software fault injection: inoculating programs against errors. New York, NY, USA: John Wiley & Sons, Inc., 1997.
-
(1997)
Software Fault Injection: Inoculating Programs Against Errors
-
-
Voas, J.M.1
McGraw, G.2
-
32
-
-
0027836576
-
Efficient software-based fault isolation
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham, "Efficient software-based fault isolation," in SOSP, 1993, pp. 203-216.
-
(1993)
SOSP
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
33
-
-
0003308071
-
Dynamic storage allocation: A survey and critical review
-
P. R. Wilson, M. S. Johnstone, M. Neely, and D. Boles, "Dynamic storage allocation: A survey and critical review," in IWMM, 1995.
-
(1995)
IWMM
-
-
Wilson, P.R.1
Johnstone, M.S.2
Neely, M.3
Boles, D.4
-
34
-
-
84908296347
-
Safedrive: Safe and recoverable extensions using language-based techniques
-
Usenix
-
F. Zhou, J. Condit, Z. Anderson, I. Bagrak, R. Ennals, M. Harren, G. Necula, and E. Brewer, "Safedrive: Safe and recoverable extensions using language-based techniques," in OSDI'06. Usenix, 2006.
-
(2006)
OSDI'06
-
-
Zhou, F.1
Condit, J.2
Anderson, Z.3
Bagrak, I.4
Ennals, R.5
Harren, M.6
Necula, G.7
Brewer, E.8
|