Thread-safe dynamic binary translation using transactional memory
暂无分享,去创建一个
[1] Kunle Olukotun,et al. Transactional memory coherence and consistency , 2004, Proceedings. 31st Annual International Symposium on Computer Architecture, 2004..
[2] Tadeusz Pietraszek,et al. Defending Against Injection Attacks Through Context-Sensitive String Evaluation , 2005, RAID.
[3] Wei Xu,et al. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks , 2006, USENIX Security Symposium.
[4] Nicholas Nethercote,et al. How to shadow every byte of memory used by a program , 2007, VEE '07.
[5] Anh Nguyen-Tuong,et al. Automatically Hardening Web Applications Using Precise Tainting , 2005, SEC.
[6] Craig B. Zilles,et al. Hardware Atomicity: An Effective Abstraction for Reliable Software Speculation , 2008, IEEE Micro.
[7] Anoop Gupta,et al. The SPLASH-2 programs: characterization and methodological considerations , 1995, ISCA.
[8] Haitham Akkary,et al. Checkpoint processing and recovery: towards scalable large instruction window processors , 2003, Proceedings. 36th Annual IEEE/ACM International Symposium on Microarchitecture, 2003. MICRO-36..
[9] Christoforos E. Kozyrakis,et al. Raksha: a flexible information flow architecture for software security , 2007, ISCA '07.
[10] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[11] David A. Wood,et al. LogTM: log-based transactional memory , 2006, The Twelfth International Symposium on High-Performance Computer Architecture, 2006..
[12] John Yates,et al. FX!32 a profile-directed binary translator , 1998, IEEE Micro.
[13] Maurice Herlihy,et al. Wait-free synchronization , 1991, TOPL.
[14] Alessandro Orso,et al. Dytan: a generic dynamic taint analysis framework , 2007, ISSTA '07.
[15] Michael F. Spear,et al. An integrated hardware-software approach to flexible transactional memory , 2007, ISCA '07.
[16] Brian T. Lewis,et al. Compiler and runtime support for efficient software transactional memory , 2006, PLDI '06.
[17] Cheng Wang,et al. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).
[18] David Gay,et al. Fast Escape Analysis and Stack Allocation for Object-Based Programs , 2000, CC.
[19] Evelyn Duesterwald,et al. Design and implementation of a dynamic optimization framework for windows , 2000 .
[20] Jonathan S. Shapiro,et al. HDTrans: an open source, low-level dynamic instrumentation system , 2006, VEE '06.
[21] Nicholas Nethercote,et al. Using Valgrind to Detect Undefined Value Errors with Bit-Precision , 2005, USENIX Annual Technical Conference, General Track.
[22] Jack W. Davidson,et al. Safe virtual execution using software dynamic translation , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[23] Maurice Herlihy,et al. Transactional Memory: Architectural Support For Lock-free Data Structures , 1993, Proceedings of the 20th Annual International Symposium on Computer Architecture.
[24] James Newsom,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software, Network and Distributed System Security Symposium Conference Proceedings : 2005 , 2005 .
[25] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[26] Bratin Saha,et al. McRT-STM: a high performance software transactional memory system for a multi-core runtime , 2006, PPoPP '06.
[27] Kunle Olukotun,et al. An effective hybrid transactional memory system with strong isolation guarantees , 2007, ISCA '07.
[28] Paul E. McKenney,et al. READ-COPY UPDATE: USING EXECUTION HISTORY TO SOLVE CONCURRENCY PROBLEMS , 2002 .
[29] Nir Shavit,et al. Transactional Locking II , 2006, DISC.
[30] Quinn Jacobson,et al. Architectural Support for Software Transactional Memory , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).
[31] Cheng Wang,et al. Software-based transparent and comprehensive control-flow error detection , 2006, International Symposium on Code Generation and Optimization (CGO'06).
[32] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[33] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[34] Craig B. Zilles,et al. Hardware atomicity for reliable software speculation , 2007, ISCA '07.
[35] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[36] Keir Fraser,et al. Language support for lightweight transactions , 2003, SIGP.
[37] Dan Grossman,et al. Enforcing isolation and ordering in STM , 2007, PLDI '07.