SoftBound: highly compatible and complete spatial memory safety for c
暂无分享,去创建一个
Milo M. K. Martin | Santosh Nagarakatte | Steve Zdancewic | Jianzhou Zhao | Milo M. K. Martin | Jianzhou Zhao | Santosh Nagarakatte | S. Zdancewic | Steve Zdancewic
[1] James Cheney,et al. Cyclone: A Safe Dialect of C , 2002, USENIX Annual Technical Conference, General Track.
[2] Nicholas Nethercote,et al. Using Valgrind to Detect Undefined Value Errors with Bit-Precision , 2005, USENIX Annual Technical Conference, General Track.
[3] Dinakar Dhurjati,et al. Secure virtual architecture: a safe execution environment for commodity operating systems , 2007, SOSP.
[4] Anne Rogers,et al. Supporting dynamic data structures on distributed-memory machines , 1995, TOPL.
[5] Milo M. K. Martin,et al. Hardbound: architectural support for spatial safety of the C programming language , 2008, ASPLOS.
[6] Susan Horwitz,et al. Protecting C programs from attacks via invalid pointer dereferences , 2003, ESEC/FSE-11.
[7] Tauno Kekäle,et al. Beautiful Code. Leading Programmers Explain How They Think , 2009 .
[8] Somesh Jha,et al. Buffer overrun detection using linear programming and static analysis , 2003, CCS '03.
[9] Tzi-cker Chiueh,et al. Checking array bound violation using segmentation hardware , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[10] Dinakar Dhurjati,et al. Memory safety without runtime checks or garbage collection , 2003, LCTES '03.
[11] Wei Xu,et al. An efficient and backwards-compatible transformation to ensure memory safety of C programs , 2004, SIGSOFT '04/FSE-12.
[12] Emery D. Berger,et al. DieHard: probabilistic memory safety for unsafe languages , 2006, PLDI '06.
[13] N. Nethercote. Bounds-Checking Entire Programs without Recompiling [ Extended , 2004 .
[14] Emery D. Berger,et al. Exterminator: automatically correcting memory errors with high probability , 2007, PLDI '07.
[15] Harish Patil,et al. Low‐cost, Concurrent Checking of Pointer and Array Accesses in C Programs , 1997, Softw. Pract. Exp..
[16] Yuanyuan Zhou,et al. BugBench: Benchmarks for Evaluating Bug Detection Tools , 2005 .
[17] Robert O. Hastings,et al. Fast detection of memory leaks and access errors , 1991 .
[18] Todd M. Austin,et al. Efficient detection of all pointer and array access errors , 1994, PLDI '94.
[19] Hugo Herbelin,et al. The Coq proof assistant : reference manual, version 6.1 , 1997 .
[20] George C. Necula,et al. CCured: type-safe retrofitting of legacy software , 2005, TOPL.
[21] George C. Necula,et al. Dependent Types for Low-Level Programming , 2007, ESOP.
[22] Olatunji Ruwase,et al. A Practical Dynamic Buffer Overflow Detector , 2004, NDSS.
[23] Paul H. J. Kelly,et al. Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs , 1997, AADEBUG.
[24] Harish Patil,et al. Efficient Run-time Monitoring Using Shadow Processing , 1995, AADEBUG.
[25] Patrick Cousot,et al. A static analyzer for large safety-critical software , 2003, PLDI '03.
[26] Vivek Sarkar,et al. ABCD: eliminating array bounds checks on demand , 2000, PLDI '00.
[27] Miguel Castro,et al. Securing software by enforcing data-flow integrity , 2006, OSDI '06.
[28] Michael Rodeh,et al. CSSV: towards a realistic tool for statically detecting all buffer overflows in C , 2003, PLDI '03.
[29] Hanspeter Mössenböck,et al. Array bounds check elimination for the Java HotSpot#8482; client compiler , 2007, PPPJ.
[30] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[31] Dan Grossman,et al. Safe Programming at the C Level of Abstraction , 2003 .
[32] Dinakar Dhurjati,et al. SAFECode: enforcing alias analysis for weakly typed languages , 2005, PLDI '06.
[33] Hans-Juergen Boehm. Space efficient conservative garbage collection , 2004, SIGP.
[34] Zhe Yang,et al. Modular checking for buffer overflows in the large , 2006, ICSE.
[35] David Gay,et al. Memory management with explicit regions , 1998, PLDI.
[36] Miguel Castro,et al. Preventing Memory Error Exploits with WIT , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[37] Frank Ch. Eigler. Mudflap: Pointer use checking for C/C , 2003 .
[38] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[39] Calton Pu,et al. Buffer overflows: attacks and defenses for the vulnerability of the decade , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[40] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[41] Ken Kennedy,et al. A Methodology for Procedure Cloning , 1993, Computer languages.
[42] Dinakar Dhurjati,et al. Backwards-compatible array bounds checking for C with very low overhead , 2006, ICSE.
[43] John Wilander,et al. A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention , 2003, NDSS.
[44] James Cheney,et al. Region-based memory management in cyclone , 2002, PLDI '02.
[45] Jonathan D. Pincus,et al. Beyond stack smashing: recent advances in exploiting buffer overruns , 2004, IEEE Security & Privacy Magazine.