-
1
-
-
80051950485
-
Effcient, sensitivity resistant binary instrumentation
-
Toronto, CA, July
-
A. R. Bernat, K. Roundy, and B. P. Miller. Effcient, sensitivity resistant binary instrumentation. In International Symposium on Software Testing and Analysis (ISSTA), Toronto, CA, July 2011.
-
(2011)
International Symposium on Software Testing and Analysis (ISSTA)
-
-
Bernat, A.R.1
Roundy, K.2
Miller, B.P.3
-
2
-
-
84943422723
-
An infrastructure for adaptive dynamic optimization
-
San Francisco, CA, March
-
D. Bruening, T. Garnett, and S. Amarasinghe. An infrastructure for adaptive dynamic optimization. In Symposium on Code Generation and Optimization (CGO), San Francisco, CA, March 2003.
-
(2003)
Symposium on Code Generation and Optimization (CGO)
-
-
Bruening, D.1
Garnett, T.2
Amarasinghe, S.3
-
4
-
-
4544257315
-
Link-time optimization of arm binaries
-
Jun
-
B. De Bus, B. De Sutter, L. Van Put, D. Chanet, and K. De Bosschere. Link-time optimization of arm binaries. In 2004 ACM SIGPLAN/SIGBED conference on Languages, Compilers, and Tools, pages 211-220, Jun 2004.
-
(2004)
2004 ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools
, pp. 211-220
-
-
De Bus, B.1
De Sutter, B.2
Van Put, L.3
Chanet, D.4
De Bosschere, K.5
-
6
-
-
85084160432
-
ATOM: A exible interface for building high performance program analysis tools
-
New Orleans, LA, January
-
A. Eustace and A. Srivastava. ATOM: A exible interface for building high performance program analysis tools. In USENIX Technical Conference, New Orleans, LA, January 1995.
-
(1995)
USENIX Technical Conference
-
-
Eustace, A.1
Srivastava, A.2
-
7
-
-
31044439391
-
Graph transformation in a nutshell
-
DOI 10.1016/j.entcs.2005.12.018, PII S157106610600048X
-
R. Heckel. Graph transformation in a nutshell. In Electr. Notes Theor. Comput. Sci., pages 187-198. Elsevier, 2006. (Pubitemid 43121243)
-
(2006)
Electronic Notes in Theoretical Computer Science
, vol.148
, Issue.1 SPEC. ISS.
, pp. 187-198
-
-
Heckel, R.1
-
8
-
-
77952564111
-
PEBIL: Effcient static binary instrumentation for linux
-
White Plains, NY
-
M. Laurenzano, M. Tikir, L. Carrington, and A. Snavely. PEBIL: Effcient static binary instrumentation for linux. In International Symposium for Performance Analysis of Systems and Software (ISPASS), White Plains, NY, 2010.
-
(2010)
International Symposium for Performance Analysis of Systems and Software (ISPASS)
-
-
Laurenzano, M.1
Tikir, M.2
Carrington, L.3
Snavely, A.4
-
9
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
Chicago, IL, USA, June
-
C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood. Pin: building customized program analysis tools with dynamic instrumentation. In Programming Language Design and Implementation (PLDI), pages 190-200, Chicago, IL, USA, June 2005.
-
(2005)
Programming Language Design and Implementation (PLDI)
, pp. 190-200
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
10
-
-
34548737161
-
Exploring multiple execution paths for malware analysis
-
Oakland, CA, USA, May
-
A. Moser, C. Kruegel, and E. Kirda. Exploring multiple execution paths for malware analysis. In Security and Privacy (SP), Oakland, CA, USA, May 2007.
-
(2007)
Security and Privacy (SP)
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
11
-
-
84886067644
-
Bird: Binary interpretation using runtime disassembly
-
New York, NY
-
S. Nanda, W. Li, L.-C. Lam, and T. cker Chiueh. Bird: Binary interpretation using runtime disassembly. In International Symposium on Code Generation and Optimization (CGO 2006), pages 358-370, New York, NY, 2006.
-
(2006)
International Symposium on Code Generation and Optimization (CGO 2006)
, pp. 358-370
-
-
Nanda, S.1
Li, W.2
Lam, L.-C.3
Chiueh, T.C.4
-
13
-
-
84882740544
-
Vulnerability-specific execution filtering for exploit prevention on commodity software
-
San Diego, CA, USA, February
-
J. Newsome, D. Brumley, D. Song, J. Chamcham, and X. Kovah. Vulnerability-specific execution filtering for exploit prevention on commodity software. In Network and Distributed Systems Security Symposium (NDSS), San Diego, CA, USA, February 2006.
-
(2006)
Network and Distributed Systems Security Symposium (NDSS)
-
-
Newsome, J.1
Brumley, D.2
Song, D.3
Chamcham, J.4
Kovah, X.5
-
14
-
-
47849112591
-
Judostm: A dynamic binary-rewriting approach to software transactional memory
-
Brasov, Romania
-
M. Olszewski, J. Cutler, and J. Steffan. Judostm: A dynamic binary-rewriting approach to software transactional memory. In Parallel Architecture and Compilation Techniques, pages 365-375, Brasov, Romania, 2007.
-
(2007)
Parallel Architecture and Compilation Techniques
, pp. 365-375
-
-
Olszewski, M.1
Cutler, J.2
Steffan, J.3
|