메뉴 건너뛰기




Volumn , Issue , 2014, Pages 175-184

Watchdoglite: Hardware-accelerated compiler-based pointer checking

Author keywords

Bounds checking; Memory safety; Spatial safety; Temporal safety; Use after free checking

Indexed keywords

HARDWARE; METADATA;

EID: 84900675340     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2544137.2544147     Document Type: Conference Paper
Times cited : (81)

References (48)
  • 1
    • 85049220056 scopus 로고    scopus 로고
    • Baggy bounds checking: An efficient and backwards-compatible defense against out-of-bounds errors
    • Aug
    • P. Akritidis, M. Costa, M. Castro, and S. Hand. Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense Against Out-of-Bounds Errors. In Proceedings of the 18th USENIX Security Symposium, Aug. 2009.
    • (2009) th USENIX Security Symposium
    • Akritidis, P.1    Costa, M.2    Castro, M.3    Hand, S.4
  • 14
    • 42549096729 scopus 로고    scopus 로고
    • Mudflap: Pointer use checking for C/C++
    • F. C. Eigler. Mudflap: Pointer Use Checking for C/C++. In GCC Developer's Summit, 2003.
    • (2003) GCC Developer's Summit
    • Eigler, F.C.1
  • 17
    • 85066004054 scopus 로고    scopus 로고
    • Decoupled store completion/silent deterministic replay: Enabling scalable data memory for CPR/CFP processors
    • June
    • A. Hilton and A. Roth. Decoupled Store Completion/Silent Deterministic Replay: Enabling Scalable Data Memory for CPR/CFP Processors. In Proceedings of the 37th Annual International Symposium on Computer Architecture, June 2010.
    • (2010) th Annual International Symposium on Computer Architecture
    • Hilton, A.1    Roth, A.2
  • 26
    • 84879035678 scopus 로고    scopus 로고
    • Hardware- enforced comprehensive memory safety
    • May/June
    • S. Nagarakatte, M. M. K. Martin, and S. Zdancewic. Hardware- Enforced Comprehensive Memory Safety. IEEE Micro, 33(3), May/June 2013.
    • (2013) IEEE Micro , vol.33 , Issue.3
    • Nagarakatte, S.1    Martin, M.M.K.2    Zdancewic, S.3
  • 36
    • 0030836322 scopus 로고    scopus 로고
    • Low-cost, concurrent checking of pointer and array accesses in C programs
    • H. Patil and C. N. Fischer. Low-Cost, Concurrent Checking of Pointer and Array Accesses in C Programs. Software - Practice & Experience, 27(1):87-110, 1997.
    • (1997) Software - Practice & Experience , vol.27 , Issue.1 , pp. 87-110
    • Patil, H.1    Fischer, C.N.2
  • 37
    • 4344593013 scopus 로고    scopus 로고
    • Beyond stack smashing: Recent advances in exploiting buffer overruns
    • J. Pincus and B. Baker. Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns. IEEE Security & Privacy, 2(4):20-27, 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.4 , pp. 20-27
    • Pincus, J.1    Baker, B.2
  • 39
    • 28444490333 scopus 로고    scopus 로고
    • Safemem: Exploiting ECC-memory for detecting memory leaks and memory corruption during production runs
    • Feb
    • F. Qin, S. Lu, and Y. Zhou. SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs. In Proceedings of the 11th Symposium on High-Performance Computer Architecture, Feb. 2005.
    • (2005) th Symposium on High-Performance Computer Architecture
    • Qin, F.1    Lu, S.2    Zhou, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.