Efficient detection of all pointer and array access errors
PLDI '94 Proceedings of the ACM SIGPLAN 1994 conference on Programming language design and implementation
Sharing and protection in a single-address-space operating system
ACM Transactions on Computer Systems (TOCS) - Special issue on computer architecture
Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Determinant Maximization with Linear Matrix Inequality Constraints
SIAM Journal on Matrix Analysis and Applications
EROS: a fast capability system
Proceedings of the seventeenth ACM symposium on Operating systems principles
Embedded computation meets the World Wide Web
Communications of the ACM
Safety checking of machine code
PLDI '00 Proceedings of the ACM SIGPLAN 2000 conference on Programming language design and implementation
Symbolic bounds analysis of pointers, array indices, and accessed memory regions
PLDI '00 Proceedings of the ACM SIGPLAN 2000 conference on Programming language design and implementation
Machine Descriptions to Build Tools for Embedded Systems
LCTES '98 Proceedings of the ACM SIGPLAN Workshop on Languages, Compilers, and Tools for Embedded Systems
Integrating Path and Timing Analysis Using Instruction-Level Simulation Techniques
LCTES '98 Proceedings of the ACM SIGPLAN Workshop on Languages, Compilers, and Tools for Embedded Systems
Timing Analysis for Data Caches and Set-Associative Caches
RTAS '97 Proceedings of the 3rd IEEE Real-Time Technology and Applications Symposium (RTAS '97)
RTSS '98 Proceedings of the IEEE Real-Time Systems Symposium
Static analysis and computer security: new techniques for software assurance
Static analysis and computer security: new techniques for software assurance
StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Transparent run-time defense against stack smashing attacks
ATEC '00 Proceedings of the annual conference on USENIX Annual Technical Conference
Hi-index | 0.00 |
The new millennium heralds the convergence of communication, computing and the intelligent control of the physical environment. However, as embedded devices being networked and becoming more accessible, the threat of security breaches also becomes increasingly serious. This paper focuses on how to ensure the integrity of the system, when mobile codes could contain not only bugs but also viruses.