-
3
-
-
33846246751
-
Enhancing security using legality assertions
-
L. Wang, J. R. Cordy, and T. R. Dean, "Enhancing security using legality assertions," in Proceedings of the 12th Working Conference on Reverse Engineering, 2005, pp. 35-44.
-
(2005)
Proceedings of the 12th Working Conference on Reverse Engineering
, pp. 35-44
-
-
Wang, L.1
Cordy, J.R.2
Dean, T.R.3
-
4
-
-
67650812047
-
Soft- Bound: Highly compatible and complete spatial memory safety for C
-
S. Nagarakatte, J. Zhao, M. M. K. Martin, and S. Zdancewic, "Soft- Bound: Highly compatible and complete spatial memory safety for C," in Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2009, pp. 245-258.
-
(2009)
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 245-258
-
-
Nagarakatte, S.1
Zhao, J.2
Martin, M.M.K.3
Zdancewic, S.4
-
7
-
-
85049220056
-
Baggy bounds checking: An efficient and backwards-compatible defense against outof- bounds errors
-
P. Akritidis, M. Costa, M. Castro, and S. Hand, "Baggy bounds checking: An efficient and backwards-compatible defense against outof- bounds errors," in Proceedings of the 18th USENIX Security Symposium, 2009.
-
(2009)
Proceedings of the 18th USENIX Security Symposium
-
-
Akritidis, P.1
Costa, M.2
Castro, M.3
Hand, S.4
-
8
-
-
84881301125
-
-
U.S. Computer Emergency Readiness Team
-
US-CERT Vulnerability Notes Database, U.S. Computer Emergency Readiness Team, http://www.kb.cert.org/vuls/.
-
US-CERT Vulnerability Notes Database
-
-
-
9
-
-
20344383014
-
An efficient and backwardscompatible transformation to ensure memory safety of C programs
-
W. Xu, D. C. DuVarney, and R. Sekar, "An efficient and backwardscompatible transformation to ensure memory safety of C programs," in Proceedings of the 12th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2004, pp. 117-126.
-
(2004)
Proceedings of the 12th ACM SIGSOFT International Symposium on Foundations of Software Engineering
, pp. 117-126
-
-
Xu, W.1
Duvarney, D.C.2
Sekar, R.3
-
10
-
-
0027963879
-
Efficient detection of all pointer and array access errors
-
T. M. Austin, S. E. Breach, and G. S. Sohi, "Efficient detection of all pointer and array access errors," in Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 1994, pp. 290-301.
-
(1994)
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 290-301
-
-
Austin, T.M.1
Breach, S.E.2
Sohi, G.S.3
-
11
-
-
0030836322
-
Low-cost, concurrent checking of pointer and array accesses in C programs
-
H. Patil and C. Fischer, "Low-cost, concurrent checking of pointer and array accesses in C programs," Software: Practice & Experience, vol. 27, no. 1, pp. 87-110, 1997.
-
(1997)
Software: Practice & Experience
, vol.27
, Issue.1
, pp. 87-110
-
-
Patil, H.1
Fischer, C.2
-
12
-
-
0018491719
-
On legality assertions in euclid
-
D. B. Wortman, "On legality assertions in euclid," IEEE Transactions on Software Engineering, vol. 5, no. 4, pp. 359-367, 1979.
-
(1979)
IEEE Transactions on Software Engineering
, vol.5
, Issue.4
, pp. 359-367
-
-
Wortman, D.B.1
-
13
-
-
85084164164
-
Cyclone: A safe dialect of C
-
T. Jim, J. G. Morrisett, D. Grossman, M. W. Hicks, J. Cheney, and Y.Wang, "Cyclone: A safe dialect of C," in Proceedings of the USENIX Annual Technical Conference, 2002, pp. 275-288.
-
(2002)
Proceedings of the USENIX Annual Technical Conference
, pp. 275-288
-
-
Jim, T.1
Morrisett, J.G.2
Grossman, D.3
Hicks, M.W.4
Cheney, J.5
Wang, Y.6
-
16
-
-
35348951470
-
The software model checker BLAST: Applications to software engineering
-
D. Beyer, T. A. Henzinger, R. Jhala, and R. Majumdar, "The software model checker BLAST: Applications to software engineering," International Journal on Software Tools for Technology Transfer, vol. 9, no. 5-6, pp. 505-525, 2007.
-
(2007)
International Journal on Software Tools for Technology Transfer
, vol.9
, Issue.5-6
, pp. 505-525
-
-
Beyer, D.1
Henzinger, T.A.2
Jhala, R.3
Majumdar, R.4
-
17
-
-
0036040604
-
ESP: Path-sensitive program verification in polynomial time
-
M. Das, S. Lerner, and M. Seigle, "ESP: Path-sensitive program verification in polynomial time," in Proceedings of the ACM SIGPLAN 2002 Conference on Programming language design and implementation, 2002, pp. 57-68.
-
(2002)
Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation
, pp. 57-68
-
-
Das, M.1
Lerner, S.2
Seigle, M.3
-
18
-
-
41149167181
-
Secure virtual architecture: A safe execution environment for commodity operating systems
-
J. Criswell, A. Lenharth, D. Dhurjati, and V. Adve, "Secure virtual architecture: A safe execution environment for commodity operating systems," in Proceedings of the 21st ACM Symposium on Operating Systems Principles, 2007, pp. 351-366.
-
(2007)
Proceedings of the 21st ACM Symposium on Operating Systems Principles
, pp. 351-366
-
-
Criswell, J.1
Lenharth, A.2
Dhurjati, D.3
Adve, V.4
-
19
-
-
0000596666
-
Purify: A tool for detecting memory leaks and access errors in C and C++ programs
-
R. Hastings and B. Joyce, "Purify: A tool for detecting memory leaks and access errors in C and C++ programs," in Proceedings of the USENIX Winter Technical Conference, 1992, pp. 125-138.
-
(1992)
Proceedings of the USENIX Winter Technical Conference
, pp. 125-138
-
-
Hastings, R.1
Joyce, B.2
-
21
-
-
33646032658
-
CCured: Type-safe retrofitting of legacy software
-
G. C. Necula, J. Condit, M. Harren, S. McPeak, and W. Weimer, "CCured: Type-safe retrofitting of legacy software," ACM Transactions on Programming Languages and Systems, vol. 27, no. 3, pp. 477-526, 2005.
-
(2005)
ACM Transactions on Programming Languages and Systems
, vol.27
, Issue.3
, pp. 477-526
-
-
Necula, G.C.1
Condit, J.2
Harren, M.3
McPeak, S.4
Weimer, W.5
-
23
-
-
36549014520
-
BugBench: Benchmarks for evaluating bug detection tools
-
S. Lu, Z. Li, F. Qin, L. Tan, P. Zhou, and Y. Zhou, "BugBench: Benchmarks for evaluating bug detection tools," in Workshop on the Evaluation of Software Defect Detection Tools, 2005.
-
(2005)
Workshop on the Evaluation of Software Defect Detection Tools
-
-
Lu, S.1
Li, Z.2
Qin, F.3
Tan, L.4
Zhou, P.5
Zhou, Y.6
-
24
-
-
0029273301
-
Supporting dynamic data structures on distributed-memory machines
-
A. Rogers, M. C. Carlisle, J. H. Reppy, and L. J. Hendren, "Supporting dynamic data structures on distributed-memory machines," ACM Transactions on Programming Languages and Systems, vol. 17, no. 2, pp. 233-263, 1995.
-
(1995)
ACM Transactions on Programming Languages and Systems
, vol.17
, Issue.2
, pp. 233-263
-
-
Rogers, A.1
Carlisle, M.C.2
Reppy, J.H.3
Hendren, L.J.4
-
25
-
-
33646767376
-
Control-flow integrity
-
M. Abadi, M. Budiu, Ú. Erlingsson, and J. Ligatti, "Control-flow integrity," in Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005, pp. 340-353.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, Ú.3
Ligatti, J.4
-
26
-
-
84991997276
-
Securing software by enforcing data-flow integrity
-
M. Castro, M. Costa, and T. Harris, "Securing software by enforcing data-flow integrity," in Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation, 2006, pp. 147-160.
-
(2006)
Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation
, pp. 147-160
-
-
Castro, M.1
Costa, M.2
Harris, T.3
-
27
-
-
50249149602
-
Preventing memory error exploits with WIT
-
P. Akritidis, C. Cadar, C. Raiciu, M. Costa, and M. Castro, "Preventing memory error exploits with WIT," in IEEE Symposium on Security and Privacy, 2008, pp. 263-277.
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 263-277
-
-
Akritidis, P.1
Cadar, C.2
Raiciu, C.3
Costa, M.4
Castro, M.5
-
28
-
-
33746057447
-
SAFECode: Enforcing alias analysis for weakly typed languages
-
D. Dhurjati, S. Kowshik, and V. Adve, "SAFECode: Enforcing alias analysis for weakly typed languages," in Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2006, pp. 144-157.
-
(2006)
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 144-157
-
-
Dhurjati, D.1
Kowshik, S.2
Adve, V.3
-
29
-
-
0024085322
-
Garbage collection in an uncooperative environment
-
H.-J. Boehm and M. Weiser, "Garbage collection in an uncooperative environment," Software: Practice & Experience, vol. 18, no. 9, pp. 807-820, 1988.
-
(1988)
Software: Practice & Experience
, vol.18
, Issue.9
, pp. 807-820
-
-
Boehm, H.-J.1
Weiser, M.2
-
30
-
-
27644567432
-
Garbage collection for embedded systems
-
D. F. Bacon, P. Cheng, and D. Grove, "Garbage collection for embedded systems," in Proceedings of the 4th ACM International conference on Embedded Software, 2004, pp. 125-136.
-
(2004)
Proceedings of the 4th ACM International Conference on Embedded Software
, pp. 125-136
-
-
Bacon, D.F.1
Cheng, P.2
Grove, D.3
-
31
-
-
0027626223
-
The measured cost of conservative garbage collection
-
B. Zorn, "The measured cost of conservative garbage collection," Software: Practice & Experience, vol. 23, no. 7, pp. 733-756, 1993.
-
(1993)
Software: Practice & Experience
, vol.23
, Issue.7
, pp. 733-756
-
-
Zorn, B.1
-
32
-
-
0026243790
-
Efficiently computing static single assignment form and the control dependence graph
-
R. Cytron, J. Ferrante, B. K. Rosen, M. N. Wegman, and F. K. Zadeck, "Efficiently computing static single assignment form and the control dependence graph," ACM Transactions on Programming Languages and Systems, vol. 13, no. 4, pp. 451-490, 1991.
-
(1991)
ACM Transactions on Programming Languages and Systems
, vol.13
, Issue.4
, pp. 451-490
-
-
Cytron, R.1
Ferrante, J.2
Rosen, B.K.3
Wegman, M.N.4
Zadeck, F.K.5
-
36
-
-
84872977688
-
-
SPEC CPU Benchmarks, Standard Performance Evaluation Corporation, http://www.spec.org/.
-
SPEC CPU Benchmarks
-
-
-
37
-
-
77954021248
-
Effective memory protection using dynamic tainting
-
J. Clause, I. Doudalis, A. Orso, and M. Prvulovic, "Effective memory protection using dynamic tainting," in Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2007, pp. 284-292.
-
(2007)
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering
, pp. 284-292
-
-
Clause, J.1
Doudalis, I.2
Orso, A.3
Prvulovic, M.4
-
39
-
-
77957796156
-
Hard- Bound: Architectural support for spatial safety of the C programming language
-
J. Devietti, C. Blundell, M. M. K. Martin, and S. Zdancewic, "Hard- Bound: Architectural support for spatial safety of the C programming language," in Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008, pp. 103-114.
-
(2008)
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 103-114
-
-
Devietti, J.1
Blundell, C.2
Martin, M.M.K.3
Zdancewic, S.4
|