-
1
-
-
85084160243
-
Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, H. Hintony, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang, “Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks,” in USENIX Security, 1998.
-
(1998)
USENIX Security
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hintony, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
3
-
-
33746101822
-
Diehard: probabilistic memory safety for unsafe languages
-
E. D. Berger and B. G. Zorn, “Diehard: probabilistic memory safety for unsafe languages,” in PLDI, 2006.
-
(2006)
PLDI
-
-
Berger, E. D.1
Zorn, B. G.2
-
4
-
-
85180546932
-
-
rix
-
rix, “Smashing c++ vptrs,” http://www.phrack.org/issues.html?issue=56&id=8, 2000.
-
(2000)
Smashing c++ vptrs
-
-
-
5
-
-
85180626831
-
Java type confusion and fault attacks
-
O. Vertanen, “Java type confusion and fault attacks,” in FDTC, 2006.
-
(2006)
FDTC
-
-
Vertanen, O.1
-
6
-
-
85180814356
-
Static detection of c++ vtable escape vulnerabilities in binary code
-
D. Dewey and J. Giffin, “Static detection of c++ vtable escape vulnerabilities in binary code,” in NDSS, 2012.
-
(2012)
NDSS
-
-
Dewey, D.1
Giffin, J.2
-
13
-
-
80052007811
-
Control-flow integrity
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, “Control-flow integrity,” in CCS, 2005.
-
(2005)
CCS
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
14
-
-
84881218812
-
Practical control flow integrity & randomization for binary executables
-
San Francisco, CA
-
C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres, S. McCamant, D. Song, and W. Zou, “Practical control flow integrity & randomization for binary executables,” in Proceedings of the 34th IEEE Symposium on Security and Privacy, San Francisco, CA, 2013.
-
(2013)
Proceedings of the 34th IEEE Symposium on Security and Privacy
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
McCamant, S.6
Song, D.7
Zou, W.8
-
15
-
-
80755144046
-
Combining control-flow integrity and static analysis for efficient and validated data sandboxing
-
ACM
-
B. Zeng, G. Tan, and G. Morrisett, “Combining control-flow integrity and static analysis for efficient and validated data sandboxing,” in Proceedings of the 18th ACM conference on Computer and communications security. ACM, 2011, pp. 29–40.
-
(2011)
Proceedings of the 18th ACM conference on Computer and communications security
, pp. 29-40
-
-
Zeng, B.1
Tan, G.2
Morrisett, G.3
-
16
-
-
84901619881
-
Strato-a retargetable framework for low-level inlined-reference monitors
-
B. Zeng, G. Tan, and Ú. Erlingsson, “Strato-a retargetable framework for low-level inlined-reference monitors,” in USENIX Security Symposium, 2013.
-
(2013)
USENIX Security Symposium
-
-
Zeng, B.1
Tan, G.2
Erlingsson, Ú.3
-
19
-
-
69149107997
-
Browser security: lessons from google chrome
-
C. Reis, A. Barth, and C. Pizano, “Browser security: lessons from google chrome,” in CACM, 2009.
-
(2009)
CACM
-
-
Reis, C.1
Barth, A.2
Pizano, C.3
-
21
-
-
3042658703
-
Llvm: A compilation framework for lifelong program analysis & transformation
-
C. Lattner and V. Adve, “Llvm: A compilation framework for lifelong program analysis & transformation,” in CGO, 2004.
-
(2004)
CGO
-
-
Lattner, C.1
Adve, V.2
-
22
-
-
0003134151
-
Optimization of object-oriented programs using static class hierarchy analysis
-
J. Dean, D. Grove, and C. Chambers, “Optimization of object-oriented programs using static class hierarchy analysis,” in ECOOP, 1995.
-
(1995)
ECOOP
-
-
Dean, J.1
Grove, D.2
Chambers, C.3
-
26
-
-
85180623972
-
-
WebKit
-
WebKit, “Rendering performance tests,” https://code.google.com/p/webkit-mirror/source/browse/PerformanceTests/, 2013.
-
(2013)
Rendering performance tests
-
-
-
29
-
-
85180814356
-
Static detection of c++ vtable escape vulnerabilities in binary code
-
D. Dewey and J. T. Giffin, “Static detection of c++ vtable escape vulnerabilities in binary code,” in NDSS, 2012.
-
(2012)
NDSS
-
-
Dewey, D.1
Giffin, J. T.2
-
30
-
-
84945708437
-
A method for overlapping and erasure of lists
-
G. E. Collins, “A method for overlapping and erasure of lists,” in CACM, 1960.
-
(1960)
CACM
-
-
Collins, G. E.1
-
31
-
-
0005257134
-
One-bit counts between unique and sticky
-
D. J. Roth and D. S. Wise, “One-bit counts between unique and sticky,” in ISMM, 1998.
-
(1998)
ISMM
-
-
Roth, D. J.1
Wise, D. S.2
-
32
-
-
33745393872
-
An on-the-fly reference-counting garbage collector for java
-
Y. Levanoni and E. Petrank, “An on-the-fly reference-counting garbage collector for java,” in TOPLAS, 2006.
-
(2006)
TOPLAS
-
-
Levanoni, Y.1
Petrank, E.2
-
33
-
-
33646032658
-
Ccured: type-safe retrofitting of legacy software
-
G. C. Necula, J. Condit, M. Harren, S. McPeak, and W. Weimer, “Ccured: type-safe retrofitting of legacy software,” in TOPLAS, 2005.
-
(2005)
TOPLAS
-
-
Necula, G. C.1
Condit, J.2
Harren, M.3
McPeak, S.4
Weimer, W.5
-
34
-
-
0038716438
-
Ccured in the real world
-
J. Condit, M. Harren, S. McPeak, G. C. Necula, and W. Weimer, “Ccured in the real world,” in PLDI, 2003.
-
(2003)
PLDI
-
-
Condit, J.1
Harren, M.2
McPeak, S.3
Necula, G. C.4
Weimer, W.5
-
35
-
-
85084164164
-
Cyclone: A safe dialect of c
-
T. Jim, J. G. Morrisett, D. Grossman, M. W. Hicks, J. Cheney, and Y. Wang, “Cyclone: A safe dialect of c,” in USENIX ATEC, 2002.
-
(2002)
USENIX ATEC
-
-
Jim, T.1
Morrisett, J. G.2
Grossman, D.3
Hicks, M. W.4
Cheney, J.5
Wang, Y.6
-
36
-
-
20344383014
-
An efficient and backwards-compatible transformation to ensure memory safety of c programs
-
W. Xu, D. C. DuVarney, and R. Sekar, “An efficient and backwards-compatible transformation to ensure memory safety of c programs,” in SIGSOFT, 2004.
-
(2004)
SIGSOFT
-
-
Xu, W.1
DuVarney, D. C.2
Sekar, R.3
-
37
-
-
70350613514
-
Dependent types for low-level programming
-
J. Condit, M. Harren, Z. Anderson, D. Gay, and G. C. Necula, “Dependent types for low-level programming,” in ESOP, 2007.
-
(2007)
ESOP
-
-
Condit, J.1
Harren, M.2
Anderson, Z.3
Gay, D.4
Necula, G. C.5
-
39
-
-
84865306275
-
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities
-
J. Caballero, G. Grieco, M. Marron, and A. Nappa, “Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities,” in ISSTA, 2012.
-
(2012)
ISSTA
-
-
Caballero, J.1
Grieco, G.2
Marron, M.3
Nappa, A.4
-
40
-
-
35448955692
-
Valgrind: a framework for heavyweight dynamic binary instrumentation
-
N. Nethercote and J. Seward, “Valgrind: a framework for heavyweight dynamic binary instrumentation,” in PLDI, 2007.
-
(2007)
PLDI
-
-
Nethercote, N.1
Seward, J.2
-
41
-
-
78650032754
-
Dieharder: securing the heap
-
G. Novark and E. D. Berger, “Dieharder: securing the heap,” in CCS, 2010.
-
(2010)
CCS
-
-
Novark, G.1
Berger, E. D.2
-
42
-
-
77952351839
-
The geometry of innocent flesh on the bone: return-intolibc without function calls (on the x86)
-
H. Shacham, “The geometry of innocent flesh on the bone: return-intolibc without function calls (on the x86),” in CCS, 2007.
-
(2007)
CCS
-
-
Shacham, H.1
|