Everything You Want to Know About Pointer-Based Checking
暂无分享,去创建一个
Milo M. K. Martin | Santosh Nagarakatte | Steve Zdancewic | Milo M. K. Martin | Santosh Nagarakatte | S. Zdancewic | Steve Zdancewic
[1] N. Nethercote. Bounds-Checking Entire Programs without Recompiling [ Extended , 2004 .
[2] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[3] Paul H. J. Kelly,et al. Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs , 1997, AADEBUG.
[4] George Candea,et al. Code-pointer integrity , 2014, OSDI.
[5] Milo M. K. Martin,et al. Hardware-Enforced Comprehensive Memory Safety , 2013, IEEE Micro.
[6] Milo M. K. Martin,et al. Watchdog: Hardware for safe and secure manual memory management and full memory safety , 2012, 2012 39th Annual International Symposium on Computer Architecture (ISCA).
[7] Dawn Xiaodong Song,et al. SoK: Eternal War in Memory , 2013, 2013 IEEE Symposium on Security and Privacy.
[8] George C. Necula,et al. CCured in the real world , 2003, PLDI '03.
[9] R. Sekar,et al. Eternal War in Memory , 2014, IEEE Security & Privacy.
[10] Milo M. K. Martin,et al. Practical low-overhead enforcement of memory safety for c programs , 2012 .
[11] Armando Solar-Lezama,et al. Towards optimization-safe systems: analyzing the impact of undefined behavior , 2013, SOSP.
[12] Dinakar Dhurjati,et al. Backwards-compatible array bounds checking for C with very low overhead , 2006, ICSE.
[13] Jonathan D. Pincus,et al. Beyond stack smashing: recent advances in exploiting buffer overruns , 2004, IEEE Security & Privacy Magazine.
[14] Greg Morrisett,et al. Compiling with Types , 1995 .
[15] John Regehr,et al. Provably correct peephole optimizations with alive , 2015, PLDI.
[16] Guru Venkataramani,et al. MemTracker: Efficient and Programmable Support for Memory Access Monitoring and Debugging , 2007, 2007 IEEE 13th International Symposium on High Performance Computer Architecture.
[17] Miguel Castro,et al. Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors , 2009, USENIX Security Symposium.
[18] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[19] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[20] Harish Patil,et al. Low‐cost, Concurrent Checking of Pointer and Array Accesses in C Programs , 1997 .
[21] George C. Necula,et al. Dependent Types for Low-Level Programming , 2007, ESOP.
[22] James Cheney,et al. Cyclone: A Safe Dialect of C , 2002, USENIX Annual Technical Conference, General Track.
[23] Olatunji Ruwase,et al. A Practical Dynamic Buffer Overflow Detector , 2004, NDSS.
[24] Stelios Sidiroglou,et al. Missing the Point(er): On the Effectiveness of Code Pointer Integrity , 2015, 2015 IEEE Symposium on Security and Privacy.
[25] Yuanyuan Zhou,et al. SafeMem: exploiting ECC-memory for detecting memory leaks and memory corruption during production runs , 2005, 11th International Symposium on High-Performance Computer Architecture.
[26] Milo M. K. Martin,et al. Ironclad C++: a library-augmented type-safe subset of c++ , 2013, OOPSLA.
[27] Saugata Ghose,et al. Architectural support for low overhead detection of memory violations , 2009, 2009 Design, Automation & Test in Europe Conference & Exhibition.
[28] Milo M. K. Martin,et al. WatchdogLite: Hardware-Accelerated Compiler-Based Pointer Checking , 2014, CGO '14.
[29] George C. Necula,et al. CCured: type-safe retrofitting of legacy software , 2005, TOPL.
[30] Wenke Lee,et al. Preventing Use-after-free with Dangling Pointers Nullification , 2015, NDSS.
[31] Jingling Xue,et al. WPBOUND: Enforcing Spatial Memory Safety Efficiently at Runtime with Weakest Preconditions , 2014, 2014 IEEE 25th International Symposium on Software Reliability Engineering.
[32] Frank Ch. Eigler. Mudflap: Pointer use checking for C/C , 2003 .
[33] Hassen Saïdi,et al. A Foray into Conficker's Logic and Rendezvous Points , 2009, LEET.
[34] Dinakar Dhurjati,et al. Secure virtual architecture: a safe execution environment for commodity operating systems , 2007, SOSP.
[35] James R. Larus,et al. Transactional Memory , 2006, Transactional Memory.
[36] Milo M. K. Martin,et al. Hardbound: architectural support for spatial safety of the C programming language , 2008, ASPLOS.
[37] Wei Xu,et al. An efficient and backwards-compatible transformation to ensure memory safety of C programs , 2004, SIGSOFT '04/FSE-12.
[38] Milo M. K. Martin,et al. CETS: compiler enforced temporal safety for C , 2010, ISMM '10.
[39] Milo M. K. Martin,et al. SoftBound: highly compatible and complete spatial memory safety for c , 2009, PLDI '09.
[40] Robert O. Hastings,et al. Fast detection of memory leaks and access errors , 1991 .
[41] Todd M. Austin,et al. Efficient detection of all pointer and array access errors , 1994, PLDI '94.
[42] Satish Narayanasamy,et al. Accelerating Meta Data Checks for Software Correctness and Security , 2007, J. Instr. Level Parallelism.
[43] Rajeev Barua,et al. MemSafe: Ensuring the Spatial and Temporal Memory Safety of C at Runtime , 2010, 2010 10th IEEE Working Conference on Source Code Analysis and Manipulation.
[44] Calton Pu,et al. Buffer overflows: attacks and defenses for the vulnerability of the decade , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[45] Peter G. Neumann,et al. Beyond the PDP-11: Architectural Support for a Memory-Safe C Abstract Machine , 2015, ASPLOS.
[46] Maurice Herlihy,et al. Transactional Memory: Architectural Support For Lock-free Data Structures , 1993, Proceedings of the 20th Annual International Symposium on Computer Architecture.
[47] Susan Horwitz,et al. Protecting C programs from attacks via invalid pointer dereferences , 2003, ESEC/FSE-11.
[48] Tauno Kekäle,et al. Beautiful Code. Leading Programmers Explain How They Think , 2009 .
[49] Nicholas Nethercote,et al. How to shadow every byte of memory used by a program , 2007, VEE '07.
[50] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[51] Derek Bruening,et al. AddressSanitizer: A Fast Address Sanity Checker , 2012, USENIX Annual Technical Conference.