Memory safety

Results: 222



#Item
71The annual ACAS and University of Warwickshire Lecture in memory of Sir Pat Lowry

The annual ACAS and University of Warwickshire Lecture in memory of Sir Pat Lowry

Add to Reading List

Source URL: www.hse.gov.uk

Language: English - Date: 2010-05-12 05:22:47
72A Certified Framework for Compiling and Executing Garbage-collected Languages Andrew McCreight Tim Chevalier

A Certified Framework for Compiling and Executing Garbage-collected Languages Andrew McCreight Tim Chevalier

Add to Reading List

Source URL: web.cecs.pdx.edu

Language: English - Date: 2010-07-25 18:04:13
73Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
74Finding More Null Pointer Bugs, But Not Too Many David Hovemeyer William Pugh  Dept. of Physical Sciences

Finding More Null Pointer Bugs, But Not Too Many David Hovemeyer William Pugh Dept. of Physical Sciences

Add to Reading List

Source URL: faculty.ycp.edu

Language: English - Date: 2014-08-22 12:24:22
75WIND RIVER DIAB COMPILER Boost application performance, reduce memory footprint, and produce high-quality, standards-compliant object code for embedded systems with Wind River® Diab Compiler. It’s backed by an award-w

WIND RIVER DIAB COMPILER Boost application performance, reduce memory footprint, and produce high-quality, standards-compliant object code for embedded systems with Wind River® Diab Compiler. It’s backed by an award-w

Add to Reading List

Source URL: www.windriver.com

Language: English - Date: 2015-02-27 13:09:11
76Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers ∗ Zhenkai Liang and R. Sekar Dept. of Computer Science, Stony Brook University

Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers ∗ Zhenkai Liang and R. Sekar Dept. of Computer Science, Stony Brook University

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2009-08-03 23:33:34
77SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:27
78The annual ACAS and University of Warwick lecture in memory of Sir Pat Lowry, March 2007

The annual ACAS and University of Warwick lecture in memory of Sir Pat Lowry, March 2007

Add to Reading List

Source URL: www.hse.gov.uk

Language: English - Date: 2010-05-12 05:22:49
79Device Driver Safety Through a Reference Validation Mechanism ∗ Dan Williams, Patrick Reynolds, Kevin Walsh, Emin G¨un Sirer, and Fred B. Schneider {djwill,reynolds,kwalsh,egs,fbs}@cs.cornell.edu May 9, 2008  Abstract

Device Driver Safety Through a Reference Validation Mechanism ∗ Dan Williams, Patrick Reynolds, Kevin Walsh, Emin G¨un Sirer, and Fred B. Schneider {djwill,reynolds,kwalsh,egs,fbs}@cs.cornell.edu May 9, 2008 Abstract

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2008-05-14 11:05:27