Information Technology Reference
In-Depth Information
13. Cheon, Y.: A Runtime Assertion Checker for the Java Modeling Language, Iowa
State Univ. (2003), http://cs.iastate.edu/˜leavens/JML/
Relatedpapers/index.html
14. Meyer, B.: Object-Oriented Software Construction. Prentice-Hall, Inc. (1988)
15. ISO/IEC 9899:1999: Programming languages - C
16. Jones, R.W.M., Kelly, P.H.J.: Backwards-compatible bounds checking for arrays
and pointers in c programs. In: The Third International Workshop on Automatic
Debugging (AADEBUG 1997), pp. 13-26 (1997)
17. Nethercote, N., Seward, J.: How to shadow every byte of memory used by a pro-
gram. In: The 3rd International Conference on Virtual Execution Environments
(VEE 2007), pp. 65-74. ACM (2007)
18. Botella, B., Delahaye, M., Hong-Tuan-Ha, S., Kosmatov, N., Mouy, P., Roger,
M., Williams, N.: Automating structural testing of C programs: Experience
with PathCrawler. In: The 4th Int. Workshop on Automation of Software Test
(AST 2009), pp. 70-78. IEEE Computer Society (2009)
19. Leavens, G.T., Cheon, Y., Clifton, C., Ruby, C., Cok, D.R.: How the design of
JML accommodates both runtime assertion checking and formal verification. In:
de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2002.
LNCS, vol. 2852, pp. 262-284. Springer, Heidelberg (2003)
20. Comar, C., Kanig, J., Moy, Y.: Integrating formal program verification with testing.
In: The Embedded Real-Time Software and Systems Congress, ERTS 2012 (2012)
21. Ruwase, O., Lam, M.S.: A practical dynamic buffer overflow detector. In: The
11th Annual Network and Distributed System Security Symposium (NDSS 2004),
pp. 159-169 (2004)
22. Xu, W., DuVarney, D.C., Sekar, R.: An ecient and backwards-compatible trans-
formation to ensure memory safety of C programs. In: FSE 2004, pp. 117-126.
ACM (2004)
23. Dhurjati, D., Adve, V.S.: Backwards-compatible array bounds checking for C with
very low overhead. In: The 28th International Conference on Software Engineering
(ICSE 2006), pp. 162-171 (2006)
24. Akritidis, P., Costa, M., Castro, M., Hand, S.: Baggy bounds checking: An e-
cient and backwards-compatible defense against out-of-bounds errors. In: The 18th
USENIX Security Symposium (USENIX 2009), pp. 51-66. USENIX Association
(2009)
25. Simpson, M.S., Barua, R.: MemSafe: ensuring the spatial and temporal memory
safety of C at runtime. Softw., Pract. Exper. 43(1), 93-128 (2013)
26. Austin, T.M., Breach, S.E., Sohi, G.S.: Ecient detection of all pointer and array
access errors. In: The ACM SIGPLAN 1994 Conference on Programming Language
Design and Implementation (PLDI 1994), pp. 290-301. ACM (1994)
27. Necula,G.C.,Condit,J.,Harren,M.,McPeak,S.,Weimer,W.:CCured:type-safe
retrofitting of legacy software. ACM Trans. Program. Lang. Syst. 27(3), 477-526
(2005)
28. Oiwa, Y.: Implementation of the memory-safe full ANSI-C compiler. In: The 2009
ACM SIGPLAN Conference on Programming Language Design and Implementa-
tion (PLDI 2009), pp. 259-269. ACM (2009)
29. Yuan, J., Johnson, R.: CAWDOR: compiler assisted worm defense. In: The 12th
IEEE International Working Conference on Source Code Analysis and Manipula-
tion (SCAM 2012), pp. 54-63. IEEE Computer Society (2012)
30. Serebryany, K., Bruening, D., Potapenko, A., Vyukov, D.: AddressSanitizer: a
fast address sanity checker. In: The 2012 USENIX Annual Technical Conference
(USENIX ATC 2012), pp. 309-318. USENIX Association (2012)
 
Search WWH ::




Custom Search