Sciweavers

864 search results - page 97 / 173
» codes 2003
Sort
View
SIGSOFT
2003
ACM
16 years 1 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
128
Voted
ICSE
2003
IEEE-ACM
16 years 19 days ago
Source Viewer 3D (sv3D) - A Framework for Software Visualization
2. Support for User Interaction Source Viewer 3D is a software visualization framework that uses a 3D metaphor to represent software system and analysis data. The 3D representation...
Jonathan I. Maletic, Andrian Marcus, Louis Feng
130
Voted
MICRO
2003
IEEE
258views Hardware» more  MICRO 2003»
15 years 5 months ago
LLVA: A Low-level Virtual Instruction Set Architecture
A virtual instruction set architecture (V-ISA) implemented via a processor-specific software translation layer can provide great flexibility to processor designers. Recent examp...
Vikram S. Adve, Chris Lattner, Michael Brukman, An...
CCS
2003
ACM
15 years 5 months ago
MECA: an extensible, expressive system and language for statically checking security properties
This paper describes a system and annotation language, MECA, for checking security rules. MECA is expressive and designed for checking real systems. It provides a variety of pract...
Junfeng Yang, Ted Kremenek, Yichen Xie, Dawson R. ...
108
Voted
CODES
2004
IEEE
15 years 4 months ago
Operation tables for scheduling in the presence of incomplete bypassing
Register bypassing is a powerful and widely used feature in modern processors to eliminate certain data hazards. Although complete bypassing is ideal for performance, bypassing ha...
Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, ...