暂无分享,去创建一个
[1] Christopher Krügel,et al. Run-time Detection of Heap-based Overflows , 2003, LISA.
[2] Herbert Bos,et al. Lightweight Memory Checkpointing , 2015, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[3] D. Avots,et al. Improving software security with a C pointer analysis , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[4] Alexander Aiken,et al. Structure Slicing: Extending Logical Regions with Fields , 2014, SC14: International Conference for High Performance Computing, Networking, Storage and Analysis.
[5] Thomas R. Gross,et al. Lightweight Memory Tracing , 2013, USENIX Annual Technical Conference.
[6] Karthik Pattabiraman,et al. Samurai: protecting critical data in unsafe languages , 2008, Eurosys '08.
[7] Joseph Robert Horgan,et al. Dynamic program slicing , 1990, PLDI '90.
[8] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[9] Qi Gao,et al. First-aid: surviving and preventing memory management bugs during production runs , 2009, EuroSys '09.
[10] James Newsom,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software, Network and Distributed System Security Symposium Conference Proceedings : 2005 , 2005 .
[11] Emery D. Berger,et al. DieHard: probabilistic memory safety for unsafe languages , 2006, PLDI '06.
[12] Angelos D. Keromytis,et al. REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points , 2011, IWSEC.
[13] Zhongshu Gu,et al. DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse , 2014, USENIX Security Symposium.
[14] Todd M. Austin,et al. Efficient detection of all pointer and array access errors , 1994, PLDI '94.
[15] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.
[16] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[17] Pengfei Sun,et al. Trace-free memory data structure forensics via past inference and future speculations , 2016, ACSAC.
[18] Susan Horwitz,et al. Protecting C programs from attacks via invalid pointer dereferences , 2003, ESEC/FSE-11.
[19] E. Berger. HeapShield : Library-Based Heap Overflow Protection for Free , 2006 .
[20] Angelos D. Keromytis,et al. Self-healing multitier architectures using cascading rescue points , 2012, ACSAC '12.
[21] Dawn Xiaodong Song,et al. SoK: Eternal War in Memory , 2013, 2013 IEEE Symposium on Security and Privacy.
[22] Pengfei Sun,et al. Dynamic Memory Protection via Intel SGX-Supported Heap Allocation , 2018, 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).
[23] Sally A. McKee,et al. METRIC: Memory tracing via dynamic binary rewriting to identify cache inefficiencies , 2007, TOPL.
[24] George Candea,et al. Lightweight Snapshots and System-level Backtracking , 2013, HotOS.
[25] Zhiling Lan,et al. FREM: A Fast Restart Mechanism for General Checkpoint/Restart , 2011, IEEE Transactions on Computers.
[26] Srinidhi Varadarajan,et al. DejaVu: transparent user-level checkpointing, migration and recovery for distributed systems , 2006, SC.
[27] Andreas Krennmair. ContraPolice: a libc Extension for Protecting Applications from Heap-Smashing Attacks , 2003 .
[28] Derek Bruening,et al. An infrastructure for adaptive dynamic optimization , 2003, International Symposium on Code Generation and Optimization, 2003. CGO 2003..
[29] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[30] Pengfei Sun,et al. Compromising Security of Economic Dispatch in Power System Operations , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[31] Peng Liu,et al. Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures , 2011, PLDI '11.
[32] James P Anderson. Computer Security Technology Planning Study. Volume 2 , 1972 .
[33] Samuel T. King,et al. Recovery domains: an organizing principle for recoverable operating systems , 2009, ASPLOS.