Sciweavers

2018 search results - page 145 / 404
» Code Normal Forms
Sort
View
TDSC
2010
191views more  TDSC 2010»
15 years 3 months ago
SigFree: A Signature-Free Buffer Overflow Attack Blocker
—We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet se...
Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu
SP
2006
IEEE
214views Security Privacy» more  SP 2006»
15 years 10 months ago
Automatically Generating Malicious Disks using Symbolic Execution
Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant ...
Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar...
POPL
2002
ACM
16 years 5 months ago
Proving correctness of compiler optimizations by temporal logic
Many classical compiler optimizations can be elegantly expressed using rewrite rules of form: I = I if , where I, I are intermediate language instructions and is a property expre...
David Lacey, Neil D. Jones, Eric Van Wyk, Carl Chr...

Book
296views
17 years 2 months ago
Implementing Functional Languages: a tutorial
"This book gives a practical approach to understanding implementations of non-strict functional languages using lazy graph reduction. The book is intended to be a source of pr...
Simon Peyton Jones, David Lester
ECOOP
2005
Springer
15 years 10 months ago
Towards Reusable Heterogeneous Data-Centric Disentangled Parts
This paper presents our ongoing research towards a safe system evolution. Our approach is based on data-centric, objectoriented systems. Within those systems we utilise (i) multi-...
Michael Reinsch, Takuo Watanabe