-
1
-
-
85049220056
-
Baggy bounds checking: An efficient and backwards-compatible defense against out-of-bounds errors
-
Aug
-
P. Akritidis, M. Costa, M. Castro, and S. Hand. Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense Against Out-of-Bounds Errors. In Proceedings of the 18th USENIX Security Symposium, Aug. 2009.
-
(2009)
th USENIX Security Symposium
-
-
Akritidis, P.1
Costa, M.2
Castro, M.3
Hand, S.4
-
3
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code inject attacks
-
E. G. Barrantes, D. H. Ackley, T. S. Palmer, D. Stefanovic, and D. D. Zovi. Randomized Instruction Set Emulation to Disrupt Binary Code Inject Attacks. In Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003.
-
(2003)
th ACM Conference on Computer and Communications Security
-
-
Barrantes, E.G.1
Ackley, D.H.2
Palmer, T.S.3
Stefanovic, D.4
Zovi, D.D.5
-
9
-
-
52649155221
-
Flexible hardware acceleration for instruction-grain program monitoring
-
June
-
S. Chen, M. Kozuch, T. Strigkos, B. Falsafi, P. B. Gibbons, T. C. Mowry, V. Ramachandran, O. Ruwase, M. Ryan, and E. Vlachos. Flexible Hardware Acceleration for Instruction-Grain Program Monitoring. In Proceedings of the 35th Annual International Symposium on Computer Architecture, June 2008.
-
(2008)
th Annual International Symposium on Computer Architecture
-
-
Chen, S.1
Kozuch, M.2
Strigkos, T.3
Falsafi, B.4
Gibbons, P.B.5
Mowry, T.C.6
Ramachandran, V.7
Ruwase, O.8
Ryan, M.9
Vlachos, E.10
-
11
-
-
70350613514
-
Dependent types for low-level programming
-
Apr
-
J. Condit, M. Harren, Z. Anderson, D. Gay, and G. C. Necula. Dependent Types for Low-Level Programming. In Proceedings of the 16th European Symposium on Programming, Apr. 2007.
-
(2007)
th European Symposium on Programming
-
-
Condit, J.1
Harren, M.2
Anderson, Z.3
Gay, D.4
Necula, G.C.5
-
14
-
-
42549096729
-
Mudflap: Pointer use checking for C/C++
-
F. C. Eigler. Mudflap: Pointer Use Checking for C/C++. In GCC Developer's Summit, 2003.
-
(2003)
GCC Developer's Summit
-
-
Eigler, F.C.1
-
16
-
-
70350057475
-
Architectural support for low overhead detection of memory viloations
-
Mar
-
S. Ghose, L. Gilgeous, P. Dudnik, A. Aggarwal, and C. Waxman. Architectural Support for Low Overhead Detection of Memory Viloations. In Proceedings of the Design, Automation and Test in Europe, Mar. 2009.
-
(2009)
Proceedings of the Design, Automation and Test in Europe
-
-
Ghose, S.1
Gilgeous, L.2
Dudnik, P.3
Aggarwal, A.4
Waxman, C.5
-
17
-
-
85066004054
-
Decoupled store completion/silent deterministic replay: Enabling scalable data memory for CPR/CFP processors
-
June
-
A. Hilton and A. Roth. Decoupled Store Completion/Silent Deterministic Replay: Enabling Scalable Data Memory for CPR/CFP Processors. In Proceedings of the 37th Annual International Symposium on Computer Architecture, June 2010.
-
(2010)
th Annual International Symposium on Computer Architecture
-
-
Hilton, A.1
Roth, A.2
-
22
-
-
34547520411
-
Comprehensively and efficiently protecting the heap
-
Oct
-
M. Kharbutli, X. Jiang, Y. Solihin, G. Venkataramani, and M. Prvulovic. Comprehensively and Efficiently Protecting the Heap. In Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems, Oct. 2006.
-
(2006)
th International Conference on Architectural Support for Programming Languages and Operating Systems
-
-
Kharbutli, M.1
Jiang, X.2
Solihin, Y.3
Venkataramani, G.4
Prvulovic, M.5
-
26
-
-
84879035678
-
Hardware- enforced comprehensive memory safety
-
May/June
-
S. Nagarakatte, M. M. K. Martin, and S. Zdancewic. Hardware- Enforced Comprehensive Memory Safety. IEEE Micro, 33(3), May/June 2013.
-
(2013)
IEEE Micro
, vol.33
, Issue.3
-
-
Nagarakatte, S.1
Martin, M.M.K.2
Zdancewic, S.3
-
29
-
-
33646032658
-
CCured: Type-safe retrofitting of legacy software
-
May
-
G. C. Necula, J. Condit, M. Harren, S. McPeak, and W. Weimer. CCured: Type-Safe Retrofitting of Legacy Software. ACM Transactionstions on Programming Languages and Systems, 27(3), May 2005.
-
(2005)
ACM Transactionstions on Programming Languages and Systems
, vol.27
, Issue.3
-
-
Necula, G.C.1
Condit, J.2
Harren, M.3
Mcpeak, S.4
Weimer, W.5
-
35
-
-
84900569861
-
-
Mar. US Patent Pub No: US 2011/0078389 A1
-
B. V. Patel, R. Gopalakrishna, A. F. Glew, R. J. Kushlis, D. A. V. Dyke, J. F. Cihula, A. K. Mallick, J. B. Crossland, G. Nelger, S. D. Rodgers, M. G. Dixon, M. J. Charney, and J. Gottelieb. Managing and Implementing Metadata in Central Processing Unit Using Register Extensions, Mar. 2011. US Patent Pub No: US 2011/0078389 A1.
-
(2011)
Managing and Implementing Metadata in Central Processing Unit Using Register Extensions
-
-
Patel, B.V.1
Gopalakrishna, R.2
Glew, A.F.3
Kushlis, R.J.4
Dyke, D.A.V.5
Cihula, J.F.6
Mallick, A.K.7
Crossland, J.B.8
Nelger, G.9
Rodgers, S.D.10
Dixon, M.G.11
Charney, M.J.12
Gottelieb, J.13
-
36
-
-
0030836322
-
Low-cost, concurrent checking of pointer and array accesses in C programs
-
H. Patil and C. N. Fischer. Low-Cost, Concurrent Checking of Pointer and Array Accesses in C Programs. Software - Practice & Experience, 27(1):87-110, 1997.
-
(1997)
Software - Practice & Experience
, vol.27
, Issue.1
, pp. 87-110
-
-
Patil, H.1
Fischer, C.N.2
-
37
-
-
4344593013
-
Beyond stack smashing: Recent advances in exploiting buffer overruns
-
J. Pincus and B. Baker. Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns. IEEE Security & Privacy, 2(4):20-27, 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.4
, pp. 20-27
-
-
Pincus, J.1
Baker, B.2
-
39
-
-
28444490333
-
Safemem: Exploiting ECC-memory for detecting memory leaks and memory corruption during production runs
-
Feb
-
F. Qin, S. Lu, and Y. Zhou. SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs. In Proceedings of the 11th Symposium on High-Performance Computer Architecture, Feb. 2005.
-
(2005)
th Symposium on High-Performance Computer Architecture
-
-
Qin, F.1
Lu, S.2
Zhou, Y.3
|