-
5
-
-
85076299326
-
-
Mozilla Bugzilla Bug 1089438. Nov
-
Bad-casting from PRCListStr to nsSHistory. Mozilla Bugzilla - Bug 1089438. https://bugzilla.mozilla.org/show_bug.cgi?id=1089438, Nov 2014.
-
(2014)
Bad-Casting from PRCListStr to nsSHistory
-
-
-
7
-
-
85062418620
-
Non-control-data Attacks Are Realistic Threats
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer. Non-control-data Attacks Are Realistic Threats. In USENIX Security Symposium (Security), 2005.
-
(2005)
USENIX Security Symposium (Security)
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
8
-
-
85076265480
-
-
Nov
-
Chris Evans. Using ASAN as a protection. http://scarybeastsecurity.blogspot.com/2014/09/ using-asan-as-protection.html, Nov 2014.
-
(2014)
Using ASAN as A Protection
-
-
Evans, C.1
-
11
-
-
85076294008
-
-
Nov
-
Clang Documentation. MSVC Compatibility. http://clang.llvm.org/docs/MSVCCompatibility.html, Nov 2014.
-
(2014)
MSVC Compatibility
-
-
-
12
-
-
85076302541
-
-
CodeSourcery, Compaq, EDG, HP, IBM, Intel, R. Hat, and SGI. Revision: 1.83
-
CodeSourcery, Compaq, EDG, HP, IBM, Intel, R. Hat, and SGI. Itanium C++ ABI (Revision: 1.83). http://mentorembedded.github.io/cxx-abi/abi.html, 2005.
-
(2005)
Itanium C++ ABI
-
-
-
13
-
-
85076266320
-
-
CodeSourcery, Compaq, EDG, HP, IBM, Intel, Red Hat, and SGI. Nov
-
CodeSourcery, Compaq, EDG, HP, IBM, Intel, Red Hat, and SGI. C++ ABI Closed Issues. www.codesourcery.com/public/cxx-abi/cxx-closed.html, Nov 2014.
-
(2014)
C++ ABI Closed Issues
-
-
-
18
-
-
85076283902
-
-
Jun
-
GCC. Arrays of Variable Length. https://gcc.gnu.org/onlinedocs/gcc/Variable-Length.html, Jun 2015.
-
(2015)
Arrays of Variable Length
-
-
-
20
-
-
84977858681
-
Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard
-
E. Göktaş, E. Athanasopoulos, M. Polychronakis, H. Bos, and G. Portokalidis. Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard. In USENIX Security Symposium (Security), 2014.
-
(2014)
USENIX Security Symposium (Security)
-
-
Göktaş, E.1
Athanasopoulos, E.2
Polychronakis, M.3
Bos, H.4
Portokalidis, G.5
-
21
-
-
85076275345
-
-
Aug
-
Google. Octane Benchmark. https://code.google.com/p/ octane-benchmark, Aug 2014.
-
(2014)
Octane Benchmark
-
-
-
25
-
-
85084164164
-
Cyclone: A safe dialect of C
-
T. Jim, J. G. Morrisett, D. Grossman, M. W. Hicks, J. Cheney, and Y. Wang. Cyclone: A safe dialect of C. In USENIX Annual Technical Conference (ATC), 2002.
-
(2002)
USENIX Annual Technical Conference (ATC)
-
-
Jim, T.1
Morrisett, J.G.2
Grossman, D.3
Hicks, M.W.4
Cheney, J.5
Wang, Y.6
-
26
-
-
85076294740
-
-
I. JTC1/SC22/WG21. ISO/IEC 14882
-
I. JTC1/SC22/WG21. ISO/IEC 14882:2013 Programming Language C++ (N3690). https://isocpp.org/files/papers/N3690.pdf, 2013.
-
(2013)
2013 Programming Language C++ (N3690)
-
-
-
29
-
-
85076268273
-
-
Mozilla. DROMAEO, Aug
-
Mozilla. DROMAEO, JavaScript Performance Testing. http://dromaeo.com, Aug 2014.
-
(2014)
JavaScript Performance Testing
-
-
-
31
-
-
84906767737
-
-
MWR Labs. MWR Labs Pwn2Own 2013 Write-up: Webkit Exploit. https://labs.mwrinfosecurity.com/blog/2013/04/19/ mwr- labs- pwn2own- 2013- write- up- - - webkit- exploit/, 2013.
-
(2013)
MWR Labs Pwn2Own 2013 Write-up: Webkit Exploit
-
-
-
33
-
-
33646032658
-
Ccured: Type-safe retrofitting of legacy software
-
G. C. Necula, J. Condit, M. Harren, S. McPeak, and W. Weimer. Ccured: Type-safe retrofitting of legacy software. ACM Transactions on Programming Languages and Systems (TOPLAS), 2005.
-
(2005)
ACM Transactions on Programming Languages and Systems (TOPLAS)
-
-
Necula, G.C.1
Condit, J.2
Harren, M.3
McPeak, S.4
Weimer, W.5
-
37
-
-
0031635137
-
Portable profiling and tracing for parallel, scientific applications using c++
-
S. Shende, A. D. Malony, J. Cuny, P. Beckman, S. Karmesin, and K. Lindlan. Portable profiling and tracing for parallel, scientific applications using c++. In ACM SIGMETRICS Symposium on Parallel and Distributed Tools (SPDT), 1998.
-
(1998)
ACM SIGMETRICS Symposium on Parallel and Distributed Tools (SPDT)
-
-
Shende, S.1
Malony, A.D.2
Cuny, J.3
Beckman, P.4
Karmesin, S.5
Lindlan, K.6
-
39
-
-
84938941645
-
-
Aug
-
Standard Performance Evaluation Corporation. SPEC CPU 2006. http://www.spec.org/cpu2006, Aug 2014.
-
(2014)
SPEC CPU 2006
-
-
-
40
-
-
85076283815
-
-
Aug
-
The Chromium Project. http://www.chromium.org/Home, Aug 2014.
-
(2014)
The Chromium Project
-
-
-
41
-
-
85076290695
-
-
Nov
-
The Chromium Project. Chromium Issues - Bug 387016. http://code.google.com/p/chromium/issues/detail?id=387016, Nov 2014.
-
(2014)
Chromium Issues - Bug 387016
-
-
-
42
-
-
85076288720
-
-
Nov
-
The Chromium Projects. Undefined Behavior Sanitizer for Chromium. http://www.chromium.org/developers/testing/undefinedbehaviorsanitizer, Nov 2014.
-
(2014)
Undefined Behavior Sanitizer for Chromium
-
-
-
44
-
-
85076283140
-
-
Nov
-
The Mozilla Foundation. Firefox Web Browser. https://www.mozilla.org/firefox, Nov 2014.
-
(2014)
Firefox Web Browser
-
-
-
45
-
-
84970915820
-
Improving function pointer security for virtual method dispatches
-
C. Tice. Improving Function Pointer Security for Virtual Method Dispatches. In GNU Tools Cauldron Workshop, 2012.
-
(2012)
GNU Tools Cauldron Workshop
-
-
Tice, C.1
-
50
-
-
84881218812
-
Practical control flow integrity and randomization for binary executables
-
C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres, S. McCamant, D. Song, and W. Zou. Practical Control Flow Integrity and Randomization for Binary Executables. In IEEE Symposium on Security and Privacy (SP), 2013.
-
(2013)
IEEE Symposium on Security and Privacy (SP)
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
McCamant, S.6
Song, D.7
Zou, W.8
|