Check out the new USENIX Web site. next up previous
Next: About this document ... Up: Scrash: A System for Previous: Acknowledgments

Bibliography

1
Jacob Berkman.
Project Info for Bug-Buddy.
https://www.advogato.org/proj/bug-buddy/, 2002.

2
Bugtoaster.
Do Something about Computer Crashes.
https://www.bugtoaster.com, 2002.

3
Netscape Communications Corp.
Netscape Quality Feedback System.
https://wp.netscape.com/communicator/navigator/v4.5/qfs1.html, 2002.

4
Microsoft Corporation.
Dr. Watson Overview.
https://www.microsoft.com/TechNet/prodtechnol/winxppro/proddocs/drwatson_overview.asp, 2002.

5
Crispan Cowan, Calton Pu, Dave Maier, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang, and Heather Hinton.
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks.
In Proc. 7th USENIX Security Conference, pages 63-78, San Antonio, Texas, January 1998.

6
Giovanni Di Crescenzo, Niels Ferguson, Russell Impagliazzo, and Markus Jakobsson.
How to Forget a Secret.
In Proceedings of Symposium on Theoretical Aspects of Computer Science, number 1563 in Lecture Notes In Computer Science, 1999.

7
David Gay and Alexander Aiken.
Memory Management with Explicit Regions.
In SIGPLAN Conference on Programming Language Design and Implementation, pages 313-323, 1998.

8
David Gay and Alexander Aiken.
Language Support for Regions.
In SIGPLAN Conference on Programming Language Design and Implementation, pages 70-80, 2001.

9
Scott McPeak George C. Necula and Westley Weimer.
CCured: Type-Safe Retrofitting of Legacy Code.
In Principles of Programming Languages, 2002.

10
Peter Gutmann.
Secure Deletion of Data from Magnetic and Solid-State Memory.
In Sixth USENIX Security Symposium Proceedings, 1996.

11
George C. Necula, Scott McPeak, Westley Weimer, Raymond To, and Aman Bhargava.
CIL: Infrastructure for C Program Analysis and Transformation.
https://www.cs.berkeley.edu/~necula/cil, 2002.

12
U.S. Department of Energy Computer Incident Advisory Capability.
Office XP Error Reporting May Send Sensitive Documents to Microsoft.
https://www.ciac.org/ciac/bulletins/m-005.shtml, October 2001.

13
Andrei Sabelfeld and Andrew C. Myers.
Language-Based Information Flow Security.
IEEE Journal on Selected Areas in Communications, January 2003.

14
Umesh Shankar, Kunal Talwar, Jeffrey S. Foster, and David Wagner.
Detecting Format String Vulnerabilities with Type Qualifiers.
In 10th USENIX Security Symposium, pages 201-220, August 2001.

15
Kiem-Phong Vo.
Vmalloc: A General and Efficient Memory Allocator.
Software Practice & Experience, 26:1-18, 1996.

16
Paul R. Wilson.
Uniprocessor Garbage Collection Techniques.
In Proc. Int. Workshop on Memory Management, number 637, Saint-Malo (France), 1992. Springer-Verlag.

17
Paul R. Wilson, Mark S. Johnstone, Michael Neely, and David Boles.
Dynamic Storage Allocation: A Survey and Critical Review.
In Proc. Int. Workshop on Memory Management, Kinross Scotland (UK), 1995.

18
Brandon Wirtz.
Dr. Watson's a Big-Mouth.
https://www.griffin-digital.com/dr__watson.htm, 2002.



Naveen Sastry 2003-05-12