29.01.2014 Views

A CIL Tutorial - Department of Computer Science - ETH Zürich

A CIL Tutorial - Department of Computer Science - ETH Zürich

A CIL Tutorial - Department of Computer Science - ETH Zürich

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

References<br />

[1] Kumar Avijit, Prateek Gupta, and Deepak Gupta. TIED, libsafeplus: tools for runtime buer<br />

overow protection. In Proceedings <strong>of</strong> the 13th conference on USENIX Security Symposium -<br />

Volume 13, SSYM'04, pages 44, Berkeley, CA, USA, 2004. USENIX Association.<br />

[2] A. Baratloo, N. Singh, and T. Tsai. Transparent run-time defense against stack smashing attacks.<br />

In Proceedings <strong>of</strong> the 2000 USENIX Annual Technical Conference, USENIX'00, 2000.<br />

[3] Emery D. Berger. Heapshield: Library-based heap overow protection for free. Technical Report<br />

UMass CS TR 06-28, <strong>Department</strong> <strong>of</strong> <strong>Computer</strong> <strong>Science</strong>, University <strong>of</strong> Massachusetts, 2006.<br />

[4] Emery D. Berger and Benjamin G. Zorn. Diehard: probabilistic memory safety for unsafe<br />

languages. In Proceedings <strong>of</strong> the 2006 ACM SIGPLAN conference on Programming language<br />

design and implementation, PLDI '06, pages 158168, New York, NY, USA, 2006. ACM.<br />

[5] Marius A. Eriksen. Trickle: A userland bandwidth shaper for unix-like systems. In Proceedings<br />

<strong>of</strong> the USENIX 2005 Annual Technical Conference, FREENIX Track, USENIX'05, pages 6170,<br />

2005.<br />

51

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!