Intel MPX Explained
暂无分享,去创建一个
Christof Fetzer | Pascal Felber | Pramod Bhatotia | Oleksii Oleksenko | Dmitrii Kuvaiskii | Pramod Bhatotia | P. Felber | C. Fetzer | Dmitrii Kuvaiskii | O. Oleksenko
[1] Dinakar Dhurjati,et al. Backwards-compatible array bounds checking for C with very low overhead , 2006, ICSE.
[2] Peter G. Neumann,et al. Beyond the PDP-11: Architectural Support for a Memory-Safe C Abstract Machine , 2015, ASPLOS.
[3] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[4] Wouter Joosen,et al. RIPE: runtime intrusion prevention evaluator , 2011, ACSAC '11.
[5] Olatunji Ruwase,et al. A Practical Dynamic Buffer Overflow Detector , 2004, NDSS.
[6] Christof Fetzer,et al. Efficient Fault Tolerance using Intel MPX and TSX , 2016, DSN 2016.
[7] Jonathan M. Smith,et al. Architectural Support for Software-Defined Metadata Processing , 2015, ASPLOS.
[8] John L. Henning. SPEC CPU2006 benchmark descriptions , 2006, CARN.
[9] Angelos D. Keromytis,et al. kR^X: Comprehensive Kernel Protection against Just-In-Time Code Reuse , 2017, EuroSys.
[10] Christian Bienia,et al. PARSEC 2.0: A New Benchmark Suite for Chip-Multiprocessors , 2009 .
[11] Herbert Bos,et al. Memory Errors: The Past, the Present, and the Future , 2012, RAID.
[12] Dawson R. Engler,et al. ARCHER: using symbolic, path-sensitive analysis to detect memory access errors , 2003, ESEC/FSE-11.
[13] Roland H. C. Yap,et al. Stack Bounds Protection with Low Fat Pointers , 2017, NDSS.
[14] George Candea,et al. Code-pointer integrity , 2014, OSDI.
[15] Rajeev Barua,et al. MemSafe: Ensuring the Spatial and Temporal Memory Safety of C at Runtime , 2010, 2010 10th IEEE Working Conference on Source Code Analysis and Manipulation.
[16] James Cheney,et al. Cyclone: A Safe Dialect of C , 2002, USENIX Annual Technical Conference, General Track.
[17] Per Larsen,et al. Opaque Control-Flow Integrity , 2015, NDSS.
[18] Peter G. Neumann,et al. The CHERI capability model: Revisiting RISC in an age of risk , 2014, 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA).
[19] Brad Fitzpatrick,et al. Distributed caching with memcached , 2004 .
[20] Salvatore J. Stolfo,et al. Concurrency attacks , 2012, HotPar'12.
[21] Christof Fetzer,et al. SGXBOUNDS: Memory Safety for Shielded Execution , 2017, EuroSys.
[22] Miguel Castro,et al. Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors , 2009, USENIX Security Symposium.
[23] A. Brown,et al. The Architecture of Open Source Applications , 2011 .
[24] Frank Ch. Eigler. Mudflap: Pointer use checking for C/C , 2003 .
[25] Dinakar Dhurjati,et al. SAFECode: enforcing alias analysis for weakly typed languages , 2005, PLDI '06.
[26] Mathias Payer,et al. DataShield: Configurable Data Confidentiality and Integrity , 2017, AsiaCCS.
[27] Dawn Xiaodong Song,et al. SoK: Eternal War in Memory , 2013, 2013 IEEE Symposium on Security and Privacy.
[28] Niranjan Hasabnis,et al. Light-weight bounds checking , 2012, CGO '12.
[29] Christof Fetzer,et al. HAFT: hardware-assisted fault tolerance , 2016, EuroSys.
[30] Milo M. K. Martin,et al. Everything You Want to Know About Pointer-Based Checking , 2015, SNAPL.
[31] Milo M. K. Martin,et al. CETS: compiler enforced temporal safety for C , 2010, ISMM '10.
[32] Emery D. Berger,et al. DieHard: probabilistic memory safety for unsafe languages , 2006, PLDI '06.
[33] Milo M. K. Martin,et al. SoftBound: highly compatible and complete spatial memory safety for c , 2009, PLDI '09.
[34] Xi Chen,et al. No Need to Hide: Protecting Safe Regions on Commodity Hardware , 2017, EuroSys.
[35] Roland H. C. Yap,et al. Heap bounds protection with low fat pointers , 2016, CC.
[36] Jonathan M. Smith,et al. Low-fat pointers: compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security , 2013, CCS.
[37] George Candea,et al. High System-Code Security with Low Overhead , 2015, 2015 IEEE Symposium on Security and Privacy.
[38] Benjamin C. Pierce,et al. Micro-Policies: Formally Verified, Tag-Based Security Monitors , 2015, 2015 IEEE Symposium on Security and Privacy.
[39] Christoforos E. Kozyrakis,et al. Evaluating MapReduce for Multi-core and Multiprocessor Systems , 2007, 2007 IEEE 13th International Symposium on High Performance Computer Architecture.
[40] Derek Bruening,et al. AddressSanitizer: A Fast Address Sanity Checker , 2012, USENIX Annual Technical Conference.
[41] Robert O. Hastings,et al. Fast detection of memory leaks and access errors , 1991 .
[42] Robert N. M. Watson,et al. Into the depths of C: elaborating the de facto standards , 2016, PLDI.