Sciweavers

2018 search results - page 145 / 404
» Code Normal Forms
Sort
View
123
Voted
TDSC
2010
191views more  TDSC 2010»
15 years 29 days ago
SigFree: A Signature-Free Buffer Overflow Attack Blocker
—We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet se...
Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu
147
Voted
SP
2006
IEEE
214views Security Privacy» more  SP 2006»
15 years 8 months ago
Automatically Generating Malicious Disks using Symbolic Execution
Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant ...
Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar...
198
Voted
POPL
2002
ACM
16 years 2 months ago
Proving correctness of compiler optimizations by temporal logic
Many classical compiler optimizations can be elegantly expressed using rewrite rules of form: I = I if , where I, I are intermediate language instructions and is a property expre...
David Lacey, Neil D. Jones, Eric Van Wyk, Carl Chr...
220
Voted

Book
296views
17 years 21 days ago
Implementing Functional Languages: a tutorial
"This book gives a practical approach to understanding implementations of non-strict functional languages using lazy graph reduction. The book is intended to be a source of pr...
Simon Peyton Jones, David Lester
ECOOP
2005
Springer
15 years 8 months ago
Towards Reusable Heterogeneous Data-Centric Disentangled Parts
This paper presents our ongoing research towards a safe system evolution. Our approach is based on data-centric, objectoriented systems. Within those systems we utilise (i) multi-...
Michael Reinsch, Takuo Watanabe