-
3
-
-
77954592660
-
-
W.X.
-
W.X. http://en.wikipedia.org/wiki/W.X,.
-
-
-
-
4
-
-
77954565946
-
-
Peephole Optimization. http://en.wikipedia.org/wiki/Peephole optimization, .
-
Peephole Optimization
-
-
-
5
-
-
77954591166
-
-
Xinu
-
Xinu. http://en.wikipedia.org/wiki/Xinu.
-
-
-
-
7
-
-
77954603608
-
AMD64 Architecture Programmers Manual Volume 3: General-Purpose and System Instructions
-
3.14 edition, September
-
AMD64 Architecture Programmers Manual Volume 3: General-Purpose and System Instructions. Advanced Micro Devices, 3.14 edition, September 2007.
-
(2007)
Advanced Micro Devices
-
-
-
10
-
-
77954570757
-
-
ApacheBench. http://httpd.apache.org/docs/2.2/programs/ab.html.
-
-
-
-
13
-
-
0019398205
-
Register Allocation Via Coloring
-
G. J. Chaitin, M. A. Auslander, A. K. Chandra, J. Cocke, M. E. Hopkins, and P. W. Markstein. Register Allocation Via Coloring. Computer Languages, 6:47-57, 1981.
-
(1981)
Computer Languages
, vol.6
, pp. 47-57
-
-
Chaitin, G.J.1
Auslander, M.A.2
Chandra, A.K.3
Cocke, J.4
Hopkins, M.E.5
Markstein, P.W.6
-
14
-
-
85084160243
-
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In Proceedings of the 7th USENIX Security Symposium, January 1998.
-
Proceedings of the 7th USENIX Security Symposium, January 1998
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
21
-
-
85084164164
-
Cyclone: A Safe Dialect of C
-
T. Jim, J. G. Morrisett, D. Grossman, M. W. Hicks, J. Cheney, and Y.Wang. Cyclone: A Safe Dialect of C. In Proceedings of the 2002 USENIX Annual Technical Conference, June 2002.
-
Proceedings of the 2002 USENIX Annual Technical Conference, June 2002
-
-
Jim, T.1
Morrisett, J.G.2
Grossman, D.3
Hicks, M.W.4
Cheney, J.5
Wang, Y.6
-
30
-
-
33646032658
-
CCured: Type-Safe Retrofitting of Legacy Software
-
G. C. Necula, J. Condit, M. Harren, S. McPeak, and W. Weimer. CCured: Type-Safe Retrofitting of Legacy Software. ACM Transactions on Programming Languages and Systems, 27:477-526, 2005.
-
(2005)
ACM Transactions on Programming Languages and Systems
, vol.27
, pp. 477-526
-
-
Necula, G.C.1
Condit, J.2
Harren, M.3
McPeak, S.4
Weimer, W.5
-
31
-
-
33748501504
-
SmashGuard: A Hardware Solution to Prevent Security Attacks on the Function Return Address
-
H. Ozdoganoglu, T. N. Vijaykumar, C. E. Brodley, B. A. Kupperman, and A. Jalote. SmashGuard: A Hardware Solution to Prevent Security Attacks on the Function Return Address. IEEE Transactions on Computers, 55:1271-1285, 2006.
-
(2006)
IEEE Transactions on Computers
, vol.55
, pp. 1271-1285
-
-
Ozdoganoglu, H.1
Vijaykumar, T.N.2
Brodley, C.E.3
Kupperman, B.A.4
Jalote, A.5
-
42
-
-
67650079952
-
BitVisor: A Thin Hypervisor for Enforcing I/O Device Security
-
T. Shinagawa, H. Eiraku, K. Tanimoto, K. Omote, S. Hasegawa, T. Horie, M. Hirano, K. Kourai, Y. Oyama, E. Kawai, K. Kono, S. Chiba, Y. Shinjo, and K. Kato. BitVisor: A Thin Hypervisor for Enforcing I/O Device Security. In Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, March 2009.
-
Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, March 2009
-
-
Shinagawa, T.1
Eiraku, H.2
Tanimoto, K.3
Omote, K.4
Hasegawa, S.5
Horie, T.6
Hirano, M.7
Kourai, K.8
Oyama, Y.9
Kawai, E.10
Kono, K.11
Chiba, S.12
Shinjo, Y.13
Kato, K.14
-
44
-
-
27544461178
-
Detecting Stealth Software with Strider GhostBuster
-
Y.-M. Wang, D. Beck, B. Vo, R. Roussev, and C. Verbowski. Detecting Stealth Software with Strider GhostBuster. In Proceedings of the 2005 International Conference on Dependable Systems and Networks, June 2005.
-
Proceedings of the 2005 International Conference on Dependable Systems and Networks, June 2005
-
-
Wang, Y.-M.1
Beck, D.2
Vo, B.3
Roussev, R.4
Verbowski, C.5
-
46
-
-
70450277529
-
Eliminating the Call Stack to Save RAM
-
X. Yang, N. Cooprider, and J. Regehr. Eliminating the Call Stack to Save RAM. In Proceedings of the ACM Conference on Languages, Compilers, and Tools for Embedded Systems, June 2009.
-
Proceedings of the ACM Conference on Languages, Compilers, and Tools for Embedded Systems, June 2009
-
-
Yang, X.1
Cooprider, N.2
Regehr, J.3
-
47
-
-
77950788046
-
Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. In Proceedings of the 14th ACM Conference on Computer and Communications Security, October 2007.
-
Proceedings of the 14th ACM Conference on Computer and Communications Security, October 2007
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
|