Hardbound: architectural support for spatial safety of the C programming language
暂无分享,去创建一个
Milo M. K. Martin | Colin Blundell | Steve Zdancewic | Joe Devietti | Milo M. K. Martin | S. Zdancewic | Colin Blundell | Joseph Devietti | Steve Zdancewic
[1] Harish Patil,et al. Efficient Run-time Monitoring Using Shadow Processing , 1995, AADEBUG.
[2] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[3] Hsien-Hsin S. Lee,et al. Authentication Control Point and Its Implications For Secure Processor Design , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).
[4] Dinakar Dhurjati,et al. Backwards-compatible array bounds checking for C with very low overhead , 2006, ICSE.
[5] Tzi-cker Chiueh,et al. Checking array bound violation using segmentation hardware , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[6] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[7] George C. Necula,et al. SafeDrive: safe and recoverable extensions using language-based techniques , 2006, OSDI '06.
[8] Guru Venkataramani,et al. MemTracker: Efficient and Programmable Support for Memory Access Monitoring and Debugging , 2007, 2007 IEEE 13th International Symposium on High Performance Computer Architecture.
[9] Paul H. J. Kelly,et al. Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs , 1997, AADEBUG.
[10] Srivaths Ravi,et al. Architectural support for safe software execution on embedded processors , 2006, Proceedings of the 4th International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS '06).
[11] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[12] Christoforos E. Kozyrakis,et al. Raksha: a flexible information flow architecture for software security , 2007, ISCA '07.
[13] Emery D. Berger,et al. Exterminator: automatically correcting memory errors with high probability , 2007, PLDI '07.
[14] Jack B. Dennis,et al. Programming semantics for multiprogrammed computations , 1966, CACM.
[15] George C. Necula,et al. CIL: Intermediate Language and Tools for Analysis and Transformation of C Programs , 2002, CC.
[16] Matt T. Yourst. PTLsim: A Cycle Accurate Full System x86-64 Microarchitectural Simulator , 2007, 2007 IEEE International Symposium on Performance Analysis of Systems & Software.
[17] Yan Solihin,et al. HeapMon: A helper-thread approach to programmable, automatic, and low-overhead memory bug detection , 2006, IBM J. Res. Dev..
[18] Ruby B. Lee,et al. Architecture for protecting critical secrets in microprocessors , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).
[19] Dan Boneh,et al. Architectural Support For Copy And Tamper-Resistant Software PhD Thesis , 2003 .
[20] Dinakar Dhurjati,et al. SAFECode: enforcing alias analysis for weakly typed languages , 2005, PLDI '06.
[21] N. Nethercote. Bounds-Checking Entire Programs without Recompiling [ Extended , 2004 .
[22] Maurice Herlihy,et al. Transactional Memory: Architectural Support For Lock-free Data Structures , 1993, Proceedings of the 20th Annual International Symposium on Computer Architecture.
[23] Frank G. Soltis. Inside the As/400 , 1996 .
[24] Susan Horwitz,et al. Protecting C programs from attacks via invalid pointer dereferences , 2003, ESEC/FSE-11.
[25] G. Edward Suh,et al. Design and implementation of the AEGIS single-chip secure processor using physical random functions , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).
[26] Yuanyuan Zhou,et al. SafeMem: exploiting ECC-memory for detecting memory leaks and memory corruption during production runs , 2005, 11th International Symposium on High-Performance Computer Architecture.
[27] George C. Necula,et al. CCured: type-safe retrofitting of legacy software , 2005, TOPL.
[28] Tao Zhang,et al. Using Branch Correlation to Identify Infeasible Paths for Anomaly Detection , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).
[29] Guru Venkataramani,et al. Comprehensively and efficiently protecting the heap , 2006, ASPLOS XII.
[30] Wei Liu,et al. iWatcher: efficient architectural support for software debugging , 2004, Proceedings. 31st Annual International Symposium on Computer Architecture, 2004..
[31] G. Edward Suh,et al. AEGIS: architecture for tamper-evident and tamper-resistant processing , 2003 .
[32] Hans-Juergen Boehm,et al. Garbage collection in an uncooperative environment , 1988, Softw. Pract. Exp..
[33] George C. Necula,et al. Dependent Types for Low-Level Programming , 2007, ESOP.
[34] Ruby B. Lee,et al. Runtime execution monitoring (REM) to detect and prevent malicious code execution , 2004, IEEE International Conference on Computer Design: VLSI in Computers and Processors, 2004. ICCD 2004. Proceedings..
[35] Frank Ch. Eigler. Mudflap: Pointer use checking for C/C , 2003 .
[36] Krste Asanovic,et al. Mondrian memory protection , 2002, ASPLOS X.
[37] Dan Grossman,et al. Type-safe multithreading in cyclone , 2003, TLDI '03.
[38] Wei Xu,et al. An efficient and backwards-compatible transformation to ensure memory safety of C programs , 2004, SIGSOFT '04/FSE-12.
[39] Emery D. Berger,et al. DieHard: probabilistic memory safety for unsafe languages , 2006, PLDI '06.
[40] Fredrik Larsson,et al. Simics: A Full System Simulation Platform , 2002, Computer.
[41] Hsien-Hsin S. Lee,et al. InfoShield: a security architecture for protecting information usage in memory , 2006, The Twelfth International Symposium on High-Performance Computer Architecture, 2006..
[42] Satish Narayanasamy,et al. Bounds Checking with Taint-Based Analysis , 2007, HiPEAC.
[43] James Cheney,et al. Cyclone: A Safe Dialect of C , 2002, USENIX Annual Technical Conference, General Track.
[44] Dinakar Dhurjati,et al. Secure virtual architecture: a safe execution environment for commodity operating systems , 2007, SOSP.
[45] James R. Larus,et al. Transactional Memory , 2006, Transactional Memory.
[46] Anne Rogers,et al. Supporting dynamic data structures on distributed-memory machines , 1995, TOPL.
[47] Guilherme Ottoni,et al. RIFLE: An Architectural Framework for User-Centric Information-Flow Security , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[48] Dan Grossman,et al. Experience with safe manual memory-management in cyclone , 2004, ISMM '04.
[49] Theodore A. Linden. Operating System Structures to Support Security and Reliable Software , 1976, CSUR.
[50] Dinakar Dhurjati,et al. Memory safety without runtime checks or garbage collection , 2003 .
[51] David Gay,et al. Safe manual memory management , 2007, ISMM '07.
[52] Olatunji Ruwase,et al. A Practical Dynamic Buffer Overflow Detector , 2004, NDSS.
[53] Richard P. Lippmann,et al. Using a Diagnostic Corpus of C Programs to Evaluate Buffer Overflow Detection by Static Analysis Tools , 2005 .
[54] Satish Narayanasamy,et al. Accelerating Meta Data Checks for Software Correctness and Security , 2007, J. Instr. Level Parallelism.
[55] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[56] Cheng Wang,et al. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).
[57] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[58] Robert O. Hastings,et al. Fast detection of memory leaks and access errors , 1991 .
[59] Todd M. Austin,et al. Efficient detection of all pointer and array access errors , 1994, PLDI '94.
[60] Ruby B. Lee,et al. Enlisting Hardware Architecture to Thwart Malicious Code Injection , 2004, SPC.
[61] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[62] Dinakar Dhurjati,et al. Efficiently Detecting All Dangling Pointer Uses in Production Servers , 2006, International Conference on Dependable Systems and Networks (DSN'06).
[63] James Cheney,et al. Region-based memory management in cyclone , 2002, PLDI '02.
[64] Ruby B. Lee,et al. A processor architecture defense against buffer overflow attacks , 2003, International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003..
[65] George Varghese,et al. Hardware and Binary Modification Support for Code Pointer Protection From Buffer Overflow , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[66] Darko Kirovski,et al. A Hardware-Software Platform for Intrusion Prevention , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).