Practical Byte-Granular Memory Blacklisting using Califorms
暂无分享,去创建一个
Hiroshi Sasaki | Simha Sethumadhavan | Koustubha Bhat | Miguel A. Arroyo | Kanad Sinha | M. Tarek Ibn Ziad | Miguel A. Arroyo | S. Sethumadhavan | M. T. I. Ziad | Kanad Sinha | Hiroshi Sasaki | Koustubha Bhat
[1] Yuanyuan Zhou,et al. SafeMem: exploiting ECC-memory for detecting memory leaks and memory corruption during production runs , 2005, 11th International Symposium on High-Performance Computer Architecture.
[2] Wenke Lee,et al. UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages , 2016, CCS.
[3] Peter G. Neumann,et al. CHERI Concentrate: Practical Compressed Capabilities , 2019, IEEE Transactions on Computers.
[4] Roland H. C. Yap,et al. EffectiveSan: type and memory error detection using dynamically typed C/C++ , 2017, PLDI.
[5] Milo M. K. Martin,et al. Hardbound: architectural support for spatial safety of the C programming language , 2008, ASPLOS.
[6] Dan Boneh,et al. Hacking Blind , 2014, 2014 IEEE Symposium on Security and Privacy.
[7] Peter G. Neumann,et al. CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment , 2019, ASPLOS.
[8] Stijn Eyerman,et al. Interval simulation: Raising the level of abstraction in architectural simulation , 2010, HPCA - 16 2010 The Sixteenth International Symposium on High-Performance Computer Architecture.
[9] Rajiv Kapoor,et al. Pinpointing Representative Portions of Large Intel® Itanium® Programs with Dynamic Instrumentation , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[10] Per Larsen,et al. SoK: Sanitizing for Security , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[11] Michael Hamburg,et al. Spectre Attacks: Exploiting Speculative Execution , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[12] Tong Zhang,et al. BOGO: Buy Spatial Memory Safety, Get Temporal Memory Safety (Almost) Free , 2019, ASPLOS.
[13] Lieven Eeckhout,et al. Deformable Surface 3D Reconstruction from Monocular Images , 2010 .
[14] Christoforos E. Kozyrakis,et al. ZSim: fast and accurate microarchitectural simulation of thousand-core systems , 2013, ISCA.
[15] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[16] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[17] Lieven Eeckhout,et al. Computer Architecture Performance Evaluation Methods , 2010, Computer Architecture Performance Evaluation Methods.
[18] Mathias Payer,et al. HexType: Efficient Detection of Type Confusion Errors for C++ , 2017, CCS.
[19] Jonathan M. Smith,et al. Architectural Support for Software-Defined Metadata Processing , 2015, ASPLOS.
[20] Peter G. Neumann,et al. The CHERI capability model: Revisiting RISC in an age of risk , 2014, 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA).
[21] Christof Fetzer,et al. Intel MPX Explained , 2018, PERV.
[22] Lizy Kurian John,et al. More on finding a single number to indicate overall performance of a benchmark suite , 2004, CARN.
[23] Derek Bruening,et al. AddressSanitizer: A Fast Address Sanity Checker , 2012, USENIX Annual Technical Conference.
[24] Simha Sethumadhavan,et al. Practical Memory Safety with REST , 2018, 2018 ACM/IEEE 45th Annual International Symposium on Computer Architecture (ISCA).
[25] Kostya Serebryany,et al. Memory Tagging and how it improves C/C++ memory safety , 2018, ArXiv.
[26] Herbert Bos,et al. Safelnit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities , 2017, NDSS.
[27] Milo M. K. Martin,et al. Watchdog: Hardware for safe and secure manual memory management and full memory safety , 2012, 2012 39th Annual International Symposium on Computer Architecture (ISCA).
[28] Milo M. K. Martin,et al. WatchdogLite: Hardware-Accelerated Compiler-Based Pointer Checking , 2014, CGO '14.