Active Bibliography

40 A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors – Martin Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy, Tudor Leu - 2004
3 Enhancing Availability and Security Through Failure-Oblivious Computing – Martin Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy, William S. Beebee Jr.
25 Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors – Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand
1 RUNTIME MONITORING OF C PROGRAMS FOR SECURITY AND CORRECTNESS – Suan Hsi Yong - 2004
3 Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures – Qiang Zeng, Dinghao Wu, Peng Liu - 2011
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring – Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, Changzhen Hu
10 DISE: Dynamic instruction stream editing – Marc Corliss, E Christopher Lewis, Rajeev Alur - 2002
18 Preventing Format-String Attacks via Automatic and Efficient Dynamic Checking – Michael F. Ringenburg, Dan Grossman - 2005
54 High Coverage Detection of Input-Related Security Faults – Eric Larson, Todd Austin - 2003
53 An efficient and backwards-compatible transformation to ensure memory safety of c programs – Wei Xu, Daniel C. Duvarney, R. Sekar - 2004
245 Vigilante: End-to-End Containment of Internet Worm Epidemics – Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham - 2008
16 HardBound: Architectural Support for Spatial Safety of the C Programming Language – Joe Devietti, Colin Blundell, et al. - 2008
5 Program transformation techniques for host-based intrusion prevension – Lap Chung Lam - 2005
1 On the role of static analysis in operating system checking and runtime verification – Abhishek Rai - 2005
101 Efficient Techniques for Comprehensive Protection from Memory Error Exploits – Sandeep Bhatkar, R. Sekar, Daniel C. DuVarney - 2005
1 PRACTICAL LOW-OVERHEAD ENFORCEMENT OF MEMORY SAFETY FOR C PROGRAMS – Santosh Ganapati Nagarakatte
7 Using Execution Transactions To Recover From Buffer Overflow Attacks – Stelios Sidiroglou , Angelos D. Keromytis - 2004
3 Runtime countermeasures for code injection attacks against C and C++ programs – Yves Younan, Wouter Joosen, Frank Piessens
23 Code injection in C and C++ : A survey of vulnerabilities and countermeasures – Yves Younan, Wouter Joosen, Frank Piessens - 2004