Next: About this document ...
Up: Scrash: A System for
Previous: Acknowledgments
- 1
-
Jacob Berkman.
Project Info for Bug-Buddy.
https://www.advogato.org/proj/bug-buddy/, 2002.
- 2
-
Bugtoaster.
Do Something about Computer Crashes.
https://www.bugtoaster.com, 2002.
- 3
-
Netscape Communications Corp.
Netscape Quality Feedback System.
https://wp.netscape.com/communicator/navigator/v4.5/qfs1.html,
2002.
- 4
-
Microsoft Corporation.
Dr. Watson Overview.
https://www.microsoft.com/TechNet/prodtechnol/winxppro/proddocs/drwatson_overview.asp, 2002.
- 5
-
Crispan Cowan, Calton Pu, Dave Maier, Jonathan Walpole, Peat Bakke, Steve
Beattie, Aaron Grier, Perry Wagle, Qian Zhang, and Heather Hinton.
StackGuard: Automatic Adaptive Detection and Prevention of
Buffer-Overflow Attacks.
In Proc. 7th USENIX Security Conference, pages 63-78, San
Antonio, Texas, January 1998.
- 6
-
Giovanni Di Crescenzo, Niels Ferguson, Russell Impagliazzo, and Markus
Jakobsson.
How to Forget a Secret.
In Proceedings of Symposium on Theoretical Aspects of Computer
Science, number 1563 in Lecture Notes In Computer Science, 1999.
- 7
-
David Gay and Alexander Aiken.
Memory Management with Explicit Regions.
In SIGPLAN Conference on Programming Language Design and
Implementation, pages 313-323, 1998.
- 8
-
David Gay and Alexander Aiken.
Language Support for Regions.
In SIGPLAN Conference on Programming Language Design and
Implementation, pages 70-80, 2001.
- 9
-
Scott McPeak George C. Necula and Westley Weimer.
CCured: Type-Safe Retrofitting of Legacy Code.
In Principles of Programming Languages, 2002.
- 10
-
Peter Gutmann.
Secure Deletion of Data from Magnetic and Solid-State Memory.
In Sixth USENIX Security Symposium Proceedings, 1996.
- 11
-
George C. Necula, Scott McPeak, Westley Weimer, Raymond To, and Aman Bhargava.
CIL: Infrastructure for C Program Analysis and Transformation.
https://www.cs.berkeley.edu/~necula/cil, 2002.
- 12
-
U.S. Department of Energy Computer Incident Advisory Capability.
Office XP Error Reporting May Send Sensitive Documents to
Microsoft.
https://www.ciac.org/ciac/bulletins/m-005.shtml, October 2001.
- 13
-
Andrei Sabelfeld and Andrew C. Myers.
Language-Based Information Flow Security.
IEEE Journal on Selected Areas in Communications, January 2003.
- 14
-
Umesh Shankar, Kunal Talwar, Jeffrey S. Foster, and David Wagner.
Detecting Format String Vulnerabilities with Type Qualifiers.
In 10th USENIX Security Symposium, pages 201-220, August 2001.
- 15
-
Kiem-Phong Vo.
Vmalloc: A General and Efficient Memory Allocator.
Software Practice & Experience, 26:1-18, 1996.
- 16
-
Paul R. Wilson.
Uniprocessor Garbage Collection Techniques.
In Proc. Int. Workshop on Memory Management, number 637,
Saint-Malo (France), 1992. Springer-Verlag.
- 17
-
Paul R. Wilson, Mark S. Johnstone, Michael Neely, and David Boles.
Dynamic Storage Allocation: A Survey and Critical Review.
In Proc. Int. Workshop on Memory Management, Kinross Scotland
(UK), 1995.
- 18
-
Brandon Wirtz.
Dr. Watson's a Big-Mouth.
https://www.griffin-digital.com/dr__watson.htm, 2002.
Naveen Sastry
2003-05-12