21.01.2013 Views

Lecture Notes in Computer Science 4917

Lecture Notes in Computer Science 4917

Lecture Notes in Computer Science 4917

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Fast Bounds Check<strong>in</strong>g Us<strong>in</strong>g Debug Register 113<br />

11. Intel. Ia-32 <strong>in</strong>tel architecture software developer’s manual. volume 3: System programm<strong>in</strong>g<br />

guide,<br />

http://developer.<strong>in</strong>tel.com/design/pentium4/manuals/245472.htm<br />

12. Asuru, J.M.: Optimization of array subscript range checks. ACM letters on Programm<strong>in</strong>g<br />

Languages and Systems 1(2), 109–118 (1992)<br />

13. Jones, R.W.M., Kelly, P.H.J.: Backwards-compatible bounds check<strong>in</strong>g for arrays<br />

and po<strong>in</strong>ters <strong>in</strong> c programs. In: Proceed<strong>in</strong>gs of Automated and Algorithmic Debugg<strong>in</strong>g<br />

Workshop, pp. 13–26 (1997)<br />

14. Kolte, P., Wolfe, M.: Elim<strong>in</strong>ation of redundant array subscript range checks. In:<br />

SIGPLAN Conference on Programm<strong>in</strong>g Language Design and Implementation, pp.<br />

270–278 (1995)<br />

15. Prasad, M., Chiueh, T.-C.: A b<strong>in</strong>ary rewrit<strong>in</strong>g approach to stack-based buffer overflow<br />

attacks. In: Proceed<strong>in</strong>gs of 2003 USENIX Conference (June 2003)<br />

16. Q<strong>in</strong>, F., Lu, S., Zhou, Y.: Safemem: Exploit<strong>in</strong>g ecc-memory for detect<strong>in</strong>g memory<br />

leaks and memory corruption dur<strong>in</strong>g production runs. In: HPCA 2005. Proceed<strong>in</strong>gs<br />

of the 11th International Symposium on High-Performance <strong>Computer</strong> Architecture<br />

(February 2005)<br />

17. Gupta, R.: A fresh look at optimiz<strong>in</strong>g array bound check<strong>in</strong>g. In: SIGPLAN Conference<br />

on Programm<strong>in</strong>g Language Design and Implementation, pp. 272–282 (1990)<br />

18. Gupta, R.: Optimiz<strong>in</strong>g array bound checks us<strong>in</strong>g flow analysis. ACM Letters on<br />

Programm<strong>in</strong>g Languages and Systems 2(1-4), 135–150 (1993)<br />

19. Bodik, R., Gupta, R., Sarkar, V.: Abcd: elim<strong>in</strong>at<strong>in</strong>g array bounds checks on demand.<br />

In: SIGPLAN Conference on Programm<strong>in</strong>g Language Design and Implementation,<br />

pp. 321–333 (2000)<br />

20. Chiueh, T.-C., Hsu, F.-H.: Rad: A compiler time solution to buffer overflow attacks.<br />

In: ICDCS. Proceed<strong>in</strong>gs of International Conference on Distributed Comput<strong>in</strong>g<br />

Systems, Phoenix, Arizona (April 2001)<br />

21. Chiueh, T.-C., Venkitachalam, G., Pradhan, P.: Integrat<strong>in</strong>g segmentation and pag<strong>in</strong>g<br />

protection for safe, efficient and transparent software extensions. In: Proceed<strong>in</strong>gs<br />

of 17th ACM Symposium on Operat<strong>in</strong>g Systems Pr<strong>in</strong>ciples, Charleston, SC<br />

(December 1999)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!