-
1
-
-
0026140643
-
Virtual memory primitives for user programs
-
New York, NY, USA, ACM Press
-
A. W. Appel and K. Li. Virtual memory primitives for user programs. In ASPLOS-IV: Proceedings of the fourth international conference on Architectural support for programming languages and operating systems, pages 96-107, New York, NY, USA, 1991. ACM Press.
-
(1991)
ASPLOS-IV: Proceedings of the fourth international conference on Architectural support for programming languages and operating systems
, pp. 96-107
-
-
Appel, A.W.1
Li, K.2
-
2
-
-
0027963879
-
Efficient detection of all pointer and array access errors
-
New York, NY, USA, ACM Press
-
T. M. Austin, S. E. Breach, and G. S. Sohi. Efficient detection of all pointer and array access errors. In Proceedings of the ACM SIGPLAN 1994 Conference on Programming Language Design and Implementation, pages 290-301, New York, NY, USA, 1994. ACM Press.
-
(1994)
Proceedings of the ACM SIGPLAN 1994 Conference on Programming Language Design and Implementation
, pp. 290-301
-
-
Austin, T.M.1
Breach, S.E.2
Sohi, G.S.3
-
3
-
-
33244470892
-
Improving software security with a C pointer analysis
-
New York, NY, USA, ACM Press
-
D. Avots, M. Dalton, V. B. Livshits, and M. S. Lam. Improving software security with a C pointer analysis. In ICSE '05: Proceedings of the 27th international conference on Software engineering, pages 332-341, New York, NY, USA, 2005. ACM Press.
-
(2005)
ICSE '05: Proceedings of the 27th international conference on Software engineering
, pp. 332-341
-
-
Avots, D.1
Dalton, M.2
Livshits, V.B.3
Lam, M.S.4
-
4
-
-
33745217853
-
DieHard: Probabilistic memory safety for unsafe languages
-
New York, NY, USA, ACM Press
-
E. D. Berger and B. G. Zorn. DieHard: Probabilistic memory safety for unsafe languages. In Proceedings of the 2006 ACM SIGPLAN Conference on Programming Language Design and Implementation. (PLDI 2006), pages 158-168, New York, NY, USA, 2006. ACM Press.
-
(2006)
Proceedings of the 2006 ACM SIGPLAN Conference on Programming Language Design and Implementation. (PLDI 2006)
, pp. 158-168
-
-
Berger, E.D.1
Zorn, B.G.2
-
5
-
-
35448932002
-
Efficient probabilistic memory safety
-
TR-2007-17, Department of Computer Science, University of Massachusetts Amherst, Mar
-
E. D. Berger and B. G. Zorn. Efficient probabilistic memory safety. Technical Report UMCS TR-2007-17, Department of Computer Science, University of Massachusetts Amherst, Mar. 2007.
-
(2007)
Technical Report UMCS
-
-
Berger, E.D.1
Zorn, B.G.2
-
6
-
-
0034830634
-
Composing high-performance memory allocators
-
Snowbird, Utah, June
-
E. D. Berger, B. G. Zorn, and K. S. McKinley. Composing high-performance memory allocators. In Proceedings of the 2001 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2001), Snowbird, Utah, June 2001.
-
(2001)
Proceedings of the 2001 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2001)
-
-
Berger, E.D.1
Zorn, B.G.2
McKinley, K.S.3
-
7
-
-
0024085322
-
Garbage collection in an uncooperative environment
-
H.-J. Boehm and M. Weiser. Garbage collection in an uncooperative environment. Software Practice and Experience, 18(9):807-820, 1988.
-
(1988)
Software Practice and Experience
, vol.18
, Issue.9
, pp. 807-820
-
-
Boehm, H.-J.1
Weiser, M.2
-
8
-
-
84978368551
-
Wsclock - a simple and effective algorithm for virtual memory management
-
R. W. Carr and J. L. Hennessy. Wsclock - a simple and effective algorithm for virtual memory management. In SOSP, pages 87-95, 1981.
-
(1981)
SOSP
, pp. 87-95
-
-
Carr, R.W.1
Hennessy, J.L.2
-
9
-
-
84976797486
-
Sharing and protection in a single-address-space operating system
-
Nov
-
J. S. Chase, H. M. Levy, M. J. Feeley, and E. D. Lazowska. Sharing and protection in a single-address-space operating system. ACM Transactions on Computer Systems, 12(4):271-307, Nov. 1994.
-
(1994)
ACM Transactions on Computer Systems
, vol.12
, Issue.4
, pp. 271-307
-
-
Chase, J.S.1
Levy, H.M.2
Feeley, M.J.3
Lazowska, E.D.4
-
10
-
-
79955715200
-
The working set model for program behaviour
-
P. J. Denning. The working set model for program behaviour. Communications of the ACM, 11:323-333, 1968.
-
(1968)
Communications of the ACM
, vol.11
, pp. 323-333
-
-
Denning, P.J.1
-
12
-
-
33845580061
-
Efficiently detecting all dangling pointer uses in production servers
-
Washington, DC, USA, IEEE Computer Society
-
D. Dhurjati and V. Adve. Efficiently detecting all dangling pointer uses in production servers. In DSN '06: Proceedings of the International Conference on Dependable Systems and Networks (DSN'06), pages 269-280, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
DSN '06: Proceedings of the International Conference on Dependable Systems and Networks (DSN'06)
, pp. 269-280
-
-
Dhurjati, D.1
Adve, V.2
-
13
-
-
33746057447
-
Safecode: Enforcing alias analysis for weakly typed languages
-
New York, NY, USA, ACM Press
-
D. Dhurjati, S. Kowshik, and V. Adve. Safecode: enforcing alias analysis for weakly typed languages. In Proceedings of the 2006 ACM SIGPLAN conference on Programming language design and implementation, pages 144-157, New York, NY, USA, 2006. ACM Press.
-
(2006)
Proceedings of the 2006 ACM SIGPLAN conference on Programming language design and implementation
, pp. 144-157
-
-
Dhurjati, D.1
Kowshik, S.2
Adve, V.3
-
14
-
-
1442288714
-
Memory safety without runtime checks or garbage collection
-
San Diego, CA, June, ACM Press
-
D. Dhurjati, S. Kowshik, V. Adve, and C. Lattner. Memory safety without runtime checks or garbage collection. In ACM SIGPLAN 2003 Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES'2003), San Diego, CA, June 2003. ACM Press.
-
(2003)
ACM SIGPLAN 2003 Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES'2003)
-
-
Dhurjati, D.1
Kowshik, S.2
Adve, V.3
Lattner, C.4
-
15
-
-
42549096726
-
-
P. Draschel and L. L. Peterson. High-performance cross-domain data transfer. Technical Report TR 92-11, Dept. Comp. of Sc., U. of Arizona, Tucson, AZ (USA), Mar. 1992.
-
P. Draschel and L. L. Peterson. High-performance cross-domain data transfer. Technical Report TR 92-11, Dept. Comp. of Sc., U. of Arizona, Tucson, AZ (USA), Mar. 1992.
-
-
-
-
16
-
-
0000596666
-
Purify: Fast detection of memory leaks and access errors
-
San Francisco, California
-
R. Hastings and B. Joyce. Purify: Fast detection of memory leaks and access errors. In Proc. of the Winter 1992 USENIX Conference, pages 125-138, San Francisco, California, 1991.
-
(1991)
Proc. of the Winter 1992 USENIX Conference
, pp. 125-138
-
-
Hastings, R.1
Joyce, B.2
-
17
-
-
31744449798
-
Quantifying the performance of garbage collection vs. explicit memory management
-
San Diego, CA, Oct
-
M. Hertz and E. D. Berger. Quantifying the performance of garbage collection vs. explicit memory management. In Proceedings of the 20th annual ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA), San Diego, CA, Oct. 2005.
-
(2005)
Proceedings of the 20th annual ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA)
-
-
Hertz, M.1
Berger, E.D.2
-
18
-
-
0027271324
-
Architectural support for translation table management in large address space machines
-
New York, NY, USA, ACM Press
-
J. Huck and J. Hays. Architectural support for translation table management in large address space machines. In ISCA '93: Proceedings of the 20th annual international symposium on Computer architecture, pages 39-50, New York, NY, USA, 1993. ACM Press.
-
(1993)
ISCA '93: Proceedings of the 20th annual international symposium on Computer architecture
, pp. 39-50
-
-
Huck, J.1
Hays, J.2
-
19
-
-
85084164164
-
Cyclone: A safe dialect of C
-
Berkeley, CA, USA, USENIX Association
-
T. Jim, J. G. Morrisett, D. Grossman, M. W. Hicks, J. Cheney, and Y. Wang. Cyclone: A safe dialect of C. In Proceedings of the General Track: 2002 USENIX Annual Technical Conference, pages 275-288, Berkeley, CA, USA, 2002. USENIX Association.
-
(2002)
Proceedings of the General Track: 2002 USENIX Annual Technical Conference
, pp. 275-288
-
-
Jim, T.1
Morrisett, J.G.2
Grossman, D.3
Hicks, M.W.4
Cheney, J.5
Wang, Y.6
-
20
-
-
34547520411
-
Comprehensively and efficiently protecting the heap
-
New York, NY, USA, ACM Press
-
M. Kharbutli, X. Jiang, Y. Solihin, G. Venkataramani, and M. Prvulovic. Comprehensively and efficiently protecting the heap. In ASPLOS-XII: Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems, pages 207-218, New York, NY, USA, 2006. ACM Press.
-
(2006)
ASPLOS-XII: Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 207-218
-
-
Kharbutli, M.1
Jiang, X.2
Solihin, Y.3
Venkataramani, G.4
Prvulovic, M.5
-
22
-
-
42549154521
-
-
Microsoft Corporation. Pageheap. http://support.microsoft.com/kb/286470.
-
Pageheap
-
-
-
23
-
-
0036040304
-
CCured: Type-safe retrofitting of legacy code
-
New York, NY, USA, ACM Press
-
G. C. Necula, S. McPeak, and W Weimer. CCured: type-safe retrofitting of legacy code. In POPL '02: Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of Programming Languages, pages 128-139, New York, NY, USA, 2002. ACM Press.
-
(2002)
POPL '02: Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of Programming Languages
, pp. 128-139
-
-
Necula, G.C.1
McPeak, S.2
Weimer, W.3
-
24
-
-
42549098753
-
Bounds-checking entire programs without recompiling
-
Venice, Italy, Jan
-
N. Nethercote and J. Fitzhardinge. Bounds-checking entire programs without recompiling. In SPACE 2004, Venice, Italy, Jan. 2004.
-
(2004)
SPACE 2004
-
-
Nethercote, N.1
Fitzhardinge, J.2
-
25
-
-
35448955693
-
Exterminator: Automatically correcting memory errors with high probability
-
New York, NY, USA, ACM Press
-
G. Novark, E. D. Berger, and B. G. Zorn. Exterminator: automatically correcting memory errors with high probability. In PLDI '07: Proceedings of the 2007 ACM SIGPLAN conference on Programming language design and implementation, pages 1-11, New York, NY, USA, 2007. ACM Press.
-
(2007)
PLDI '07: Proceedings of the 2007 ACM SIGPLAN conference on Programming language design and implementation
, pp. 1-11
-
-
Novark, G.1
Berger, E.D.2
Zorn, B.G.3
-
27
-
-
42549107112
-
-
B. Perens. Electric Fence v2.1. http://perens.com/FreeSoftware/ ElectricFence/.
-
B. Perens. Electric Fence v2.1. http://perens.com/FreeSoftware/ ElectricFence/.
-
-
-
-
28
-
-
84885578759
-
Rx: Treating bugs as allergies: A safe method to survive software failures
-
Proceedings of the Twentieth Symposium on Operating Systems Principles, of, Brighton, UK, Oct, ACM
-
F. Qin, J. Tucek, J. Sundaresan, and Y. Zhou. Rx: Treating bugs as allergies: A safe method to survive software failures. In Proceedings of the Twentieth Symposium on Operating Systems Principles, volume XX of Operating Systems Review, Brighton, UK, Oct. 2005. ACM.
-
(2005)
Operating Systems Review
, vol.20
-
-
Qin, F.1
Tucek, J.2
Sundaresan, J.3
Zhou, Y.4
-
29
-
-
21644473822
-
A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors)
-
Dec
-
M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, and T. Leu. A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors). In Proceedings of the 2004 Annual Computer Security Applications Conference, Dec. 2004.
-
(2004)
Proceedings of the 2004 Annual Computer Security Applications Conference
-
-
Rinard, M.1
Cadar, C.2
Dumitran, D.3
Roy, D.M.4
Leu, T.5
-
30
-
-
84906487819
-
Enhancing server availability and security through failure-oblivious computing
-
San Francisco, CA, Dec, USENIX
-
M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and J. William S. Beebee. Enhancing server availability and security through failure-oblivious computing. In Sixth Symposium on Operating Systems Design and Implementation, San Francisco, CA, Dec. 2004. USENIX.
-
(2004)
Sixth Symposium on Operating Systems Design and Implementation
-
-
Rinard, M.1
Cadar, C.2
Dumitran, D.3
Roy, D.M.4
Leu, T.5
William, J.6
Beebee, S.7
-
32
-
-
42549084952
-
-
N. Swamy, M. Hicks, G. Morrisett, D. Grossman, and T. Jim. Experience with safe manual memory management in cyclone. Science of Computer Programming, 2006. Special issue on memory management. Expands ISMM conference paper of the same name. To appear.
-
N. Swamy, M. Hicks, G. Morrisett, D. Grossman, and T. Jim. Experience with safe manual memory management in cyclone. Science of Computer Programming, 2006. Special issue on memory management. Expands ISMM conference paper of the same name. To appear.
-
-
-
-
34
-
-
85084162609
-
The case for compressed caching in virtual memory systems
-
Berkeley, CA, USA, USENIX Association
-
P. R. Wilson, S. F. Kaplan, and Y. Smaragdakis. The case for compressed caching in virtual memory systems. In Proceedings of the Annual Technical Conference on 1999 USENIX Annual Technical Conference, pages 101-116, Berkeley, CA, USA, 1999. USENIX Association.
-
(1999)
Proceedings of the Annual Technical Conference on 1999 USENIX Annual Technical Conference
, pp. 101-116
-
-
Wilson, P.R.1
Kaplan, S.F.2
Smaragdakis, Y.3
-
35
-
-
20344383014
-
An efficient and backwards-compatible transformation to ensure memory safety of C programs
-
New York, NY, USA, ACM Press
-
W Xu, D. C. DuVarney, and R. Sekar. An efficient and backwards-compatible transformation to ensure memory safety of C programs. In SIGSOFT '04/FSE-12: Proceedings of the 12th ACM SIGSOFT twelfth, international symposium on Foundations of software engineering, pages 117-126, New York, NY, USA, 2004. ACM Press.
-
(2004)
SIGSOFT '04/FSE-12: Proceedings of the 12th ACM SIGSOFT twelfth, international symposium on Foundations of software engineering
, pp. 117-126
-
-
Xu, W.1
DuVarney, D.C.2
Sekar, R.3
-
37
-
-
1542376931
-
Protecting C programs from attacks via invalid pointer dereferences
-
New York, NY, USA, ACM Press
-
S. H. Yong and S. Horwitz. Protecting C programs from attacks via invalid pointer dereferences. In ESEC/FSE-II: 11th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pages 307-316, New York, NY, USA, 2003. ACM Press.
-
(2003)
ESEC/FSE-II: 11th ACM SIGSOFT International Symposium on Foundations of Software Engineering
, pp. 307-316
-
-
Yong, S.H.1
Horwitz, S.2
|