LDX: Causality Inference by Lightweight Dual Execution
暂无分享,去创建一个
Xiangyu Zhang | Kyungtae Kim | Dongyan Xu | William N. Sumner | Dohyeong Kim | Yonghwi Kwon | Brendan Saltaformaggio
[1] Derek Hower,et al. Rerun: Exploiting Episodes for Lightweight Memory Race Recording , 2008, 2008 International Symposium on Computer Architecture.
[2] Liming Chen,et al. N-VERSION PROGRAMMINC: A FAULT-TOLERANCE APPROACH TO RELlABlLlTY OF SOFTWARE OPERATlON , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995, ' Highlights from Twenty-Five Years'..
[3] Francesco Sorrentino,et al. PENELOPE: weaving threads to expose atomicity violations , 2010, FSE '10.
[4] Satish Narayanasamy,et al. DoublePlay: Parallelizing Sequential Logging and Replay , 2012, ACM Trans. Comput. Syst..
[5] Frederic T. Chong,et al. Caisson: a hardware description language for secure information flow , 2011, PLDI '11.
[6] Zhenkai Liang,et al. BitBlaze: A New Approach to Computer Security via Binary Analysis , 2008, ICISS.
[7] John P. McDermott,et al. Doc, Wyatt, and Virgil: prototyping storage jamming defenses , 1997, Proceedings 13th Annual Computer Security Applications Conference.
[8] Xiangyu Zhang,et al. Dual Execution for On the Fly Fine Grained Execution Comparison , 2015, ASPLOS.
[9] Angelos D. Keromytis,et al. libdft: practical dynamic data flow tracking for commodity systems , 2012, VEE '12.
[10] A. Gopnik,et al. Young Children Infer Causal Strength From Probabilities and Interventions , 2005, Psychological science.
[11] Santosh K. Shrivastava,et al. Preventing state divergence in replicated distributed programs , 1990, Proceedings Ninth Symposium on Reliable Distributed Systems.
[12] Jason Nieh,et al. Transparent mutable replay for multicore debugging and patch validation , 2013, ASPLOS '13.
[13] Dominique Devriese,et al. Noninterference through Secure Multi-execution , 2010, 2010 IEEE Symposium on Security and Privacy.
[14] Kenneth P. Birman. Replication and fault-tolerance in the ISIS system , 1985, SOSP 1985.
[15] Frederic T. Chong,et al. Complete information flow tracking from the gates up , 2009, ASPLOS.
[16] Xi Wang,et al. Intrusion Recovery Using Selective Re-execution , 2010, OSDI.
[17] Michael Franz,et al. Multi-variant execution: run-time defense against malicious code injection attacks , 2009 .
[18] Frederic T. Chong,et al. Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security , 2011, 2011 38th Annual International Symposium on Computer Architecture (ISCA).
[19] Cristian Cadar,et al. VARAN the Unbelievable: An Efficient N-version Execution Framework , 2015, ASPLOS.
[20] Stephen McCamant,et al. Quantitative information flow as network flow capacity , 2008, PLDI '08.
[21] Josep Torrellas,et al. Capo: a software-hardware interface for practical deterministic multiprocessor replay , 2009, ASPLOS.
[22] Thomas H. Austin,et al. Multiple facets for dynamic information flow , 2012, POPL '12.
[23] A. Prasad Sistla,et al. Preventing Information Leaks through Shadow Executions , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[24] Andy Podgurski,et al. Causal inference for statistical fault localization , 2010, ISSTA '10.
[25] G. Miller,et al. Language and Perception , 1976 .
[26] Satish Narayanasamy,et al. Recording shared memory dependencies using strata , 2006, ASPLOS XII.
[27] Frederic T. Chong,et al. Execution leases: A hardware-supported mechanism for enforcing strong non-interference , 2009, 2009 42nd Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).
[28] Landon P. Cox,et al. TightLip: Keeping Applications from Spilling the Beans , 2007, NSDI.
[29] Cheng Wang,et al. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).
[30] Andy Podgurski,et al. NUMFL: Localizing Faults in Numerical Software Using a Value-Based Causal Model , 2015, 2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST).
[31] P. Cheng. From covariation to causation: A causal power theory. , 1997 .
[32] Xiangyu Zhang,et al. Strict control dependence and its effect on dynamic information flow analyses , 2010, ISSTA '10.
[33] Xiangyu Zhang,et al. Efficient program execution indexing , 2008, PLDI '08.
[34] Pasquale Malacaria,et al. Quantifying information leaks in software , 2010, ACSAC '10.
[35] Nickolai Zeldovich,et al. Intrusion recovery for database-backed web applications , 2011, SOSP.
[36] Xi Wang,et al. Identifying Information Disclosure in Web Applications with Retroactive Auditing , 2014, OSDI.
[37] Herbert Bos,et al. Minemu: The World's Fastest Taint Tracker , 2011, RAID.
[38] Santosh K. Shrivastava,et al. The Voltan application programming environment for fail-silent processes , 1998, Distributed Syst. Eng..
[39] Mário S. Alvim,et al. Quantifying Information Flow for Dynamic Secrets , 2014, 2014 IEEE Symposium on Security and Privacy.
[40] Eyal de Lara,et al. The taser intrusion recovery system , 2005, SOSP '05.
[41] Scott Shenker,et al. Diverse Replication for Single-Machine Byzantine-Fault Tolerance , 2008, USENIX Annual Technical Conference.
[42] Bi Wu,et al. SpanDex: Secure Password Tracking for Android , 2014, USENIX Security Symposium.
[43] Stephen McCamant,et al. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation , 2011, NDSS.
[44] Yuanyuan Zhou,et al. PRES: probabilistic replay with execution sketching on multiprocessors , 2009, SOSP '09.
[45] Mona Attariyan,et al. Automating Configuration Troubleshooting with Dynamic Information Flow Analysis , 2010, OSDI.
[46] Alessandro Orso,et al. Dytan: a generic dynamic taint analysis framework , 2007, ISSTA '07.
[47] David Evans,et al. N-Variant Systems: A Secretless Framework for Security through Diversity , 2006, USENIX Security Symposium.
[48] Emery D. Berger,et al. Archipelago: trading address space for reliability and security , 2008, ASPLOS.
[49] P. Reynier,et al. Active replication in Delta-4 , 1992, [1992] Digest of Papers. FTCS-22: The Twenty-Second International Symposium on Fault-Tolerant Computing.
[50] Emery D. Berger,et al. DieHard: probabilistic memory safety for unsafe languages , 2006, PLDI '06.
[51] Miguel Castro,et al. BASE: Using abstraction to improve fault tolerance , 2003, TOCS.
[52] Feng Cao,et al. MFL: Method-Level Fault Localization with Causal Inference , 2013, 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation.
[53] Michael Backes,et al. Automatic Discovery and Quantification of Information Leaks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[54] Hari Balakrishnan,et al. Tolerating byzantine faults in transaction processing systems using commit barrier scheduling , 2007, SOSP.
[55] Lorenzo Cavallaro,et al. Diversified Process Replicæ for Defeating Memory Error Exploits , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.