Author:
Chen Xi,Slowinska Asia,Bos Herbert
Publisher
Springer Science and Business Media LLC
Reference40 articles.
1. Akritidis P (2010) Cling: a memory allocator to mitigate dangling pointers. In: Proceedings of the 19th USENIX conference on security, SSYM’10. USENIX Association. http://dl.acm.org/citation.cfm?id=1929820.1929836
2. Balakrishnan G, Reps T (2004) Analyzing memory accesses in x86 binary executables. In: Proceedings of the conference on compiler construction, CC’04
3. Balakrishnan G, Reps T (2010) WYSINWYX: what you see is not what you execute. ACM Trans Program Lang Syst 32:23:1–23:84. doi: 10.1145/1749608.1749612
4. Berger ED, Zorn BG (2006) DieHard: probabilistic memory safety for unsafe languages. In: Proceedings of the 2006 ACM conference on programming language design and implementation, PLDI’06. doi: 10.1145/1133981.1134000
5. Berger ED, Zorn BG, McKinley KS (2002) Reconsidering custom memory allocation. In: Proceedings of the 17th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, OOPSLA’ 02, vol 37. doi: 10.1145/583854.582421
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. BINO: Automatic recognition of inline binary functions from template classes;Computers & Security;2023-09
2. DatAFLow
: Toward a Data-Flow-Guided Fuzzer;ACM Transactions on Software Engineering and Methodology;2023-07-21
3. HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding;2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN);2019-06
4. BOGO;Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems;2019-04-04
5. Static Detection of Uninitialized Stack Variables in Binary Code;Lecture Notes in Computer Science;2019