Automated Security Debugging Using Program Structural Constraints
暂无分享,去创建一个
[1] Nicholas Nethercote,et al. Dynamic Binary Analysis and Instrumentation , 2004 .
[2] Wei Liu,et al. AccMon: Automatically Detecting Memory-Related Bugs via Program Counter-Based Invariants , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[3] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[4] Jules J. Berman,et al. Ruby: The Programming Language , 2008 .
[5] Sudheendra Hangal,et al. Tracking down software bugs using automatic anomaly detection , 2002, ICSE '02.
[6] Dawson R. Engler,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Cmc: a Pragmatic Approach to Model Checking Real Code , 2022 .
[7] Wei Liu,et al. iWatcher: efficient architectural support for software debugging , 2004, Proceedings. 31st Annual International Symposium on Computer Architecture, 2004..
[8] David Flanagan,et al. The Ruby Programming Language , 2007 .
[9] Christopher Krügel,et al. Run-time Detection of Heap-based Overflows , 2003, LISA.
[10] Stephen McCamant,et al. The Daikon system for dynamic detection of likely invariants , 2007, Sci. Comput. Program..
[11] Dawson R. Engler,et al. A system and language for building system-specific, static analyses , 2002, PLDI '02.
[12] Eric Chien,et al. BLENDED ATTACKS EXPLOITS, VULNERABILITIES AND BUFFER-OVERFLOW TECHNIQUES IN COMPUTER VIRUSES , 2002 .
[13] Jun Xu,et al. Non-Control-Data Attacks Are Realistic Threats , 2005, USENIX Security Symposium.
[14] Robert O. Hastings,et al. Fast detection of memory leaks and access errors , 1991 .
[15] Jong-Deok Choi,et al. Efficient and precise datarace detection for multithreaded object-oriented programs , 2002, PLDI '02.
[16] Kathryn S. McKinley,et al. Hoard: a scalable memory allocator for multithreaded applications , 2000, SIGP.