RAP-optimizations/doc/PAX-rap-optimizations-paper/references.bib

169 lines
4.4 KiB
BibTeX
Raw Normal View History

@Article{Abadi05,
Author="M. Abadi, M. Budiu, Ú. Erlingsson, and J. Ligatti",
Title={"Control-flow integrity: Principles, implementations, and applications"},
Journal="Proceedings of the 12th ACM conference on Computer and communications security",
Year="2005",
Pages="i340-i353",
}
@Article{Aumasson12,
Author="JP. Aumasson, D.J. Bernstein",
Title="{SipHash: A Fast Short-Input PRF}",
Journal="Progress in Cryptology - INDOCRYPT",
Year="2012",
Pages="i489-i508",
}
@Article{Berlin05,
Author="D. Berlin",
Title="{Structure aliasing in GCC}",
Journal="In Proceedings of the 2005 GCC Summit",
Year="2005",
Pages="i25-i36",
}
@Article{C11-standard,
Author="ISO/IEC",
Title="{Information technology — Programming languages — C}",
Journal="ISO/IEC 9899:2011",
Year="2011",
Pages="i42",
}
@Article{Carlini14,
Author="N. Carlini, D. Wagner",
Title="{ROP is still dangerous: Breaking modern defenses.}",
Journal="In USENIX Security Symposium",
Year="2014",
Pages="i385-i399",
}
@Article{Gupta93,
Author="R. Gupta",
Title="{Optimizing array bound checks using flow analysis}",
Journal="ACM Letters on Programming Languages and Systems",
Year="1993",
Pages="i135-i150",
}
@Article{Glek10,
Author="T. Glek, J. Hubicka",
Title="{Optimizing real-world applications with GCC Link Time Optimization}",
Journal="In Proceedings of the 2010 GCC Summit",
Year="2010",
}
@Article{gccinternals,
Author="GCC-internals",
Title="{Chapter rtl and plugins}",
Journal="GNU Compiler Collection (GCC) Internals",
Year="2017",
}
@Article{Hubicka05,
Author="J. Hubicka",
Title="{Profile driven optimisations in GCC}",
Journal="In Proceedings of the 2005 GCC Summit",
Year="2005",
Pages="i107-i124",
}
@Article{Hardenedlinux18,
Author="zet",
Title="{hl-cfi project}",
Journal="https://github.com/hardenedlinux/RAP-optimizations",
Year="2018",
}
@Article{Hardekopf09,
Author="B. Hardekopf, C. Lin",
Title="{Semi-sparse flow-sensitive pointer analysis}",
Journal="Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages",
Year="2009",
Pages="i226-i238",
}
@Article{Krahmer05,
Author="S. Krahmer",
Title="{x86-64 buffer overflow exploits and the borrowed code chunks exploitation technique}",
Year="2005",
}
@Article{Merrill03,
Author="J. Merrill",
Title="{GENERIC and GIMPLE: A New Tree Representation for Entire Functions}",
Journal="In Proceedings of the 2003 GCC Summit",
Year="2003",
Pages="i171-i180",
}
@Article{Makarov07,
Author="V N. Makarov",
Title="{The integrated register allocator for GCC}",
Journal="In Proceedings of the 2007 GCC Summit",
Year="2007",
Pages="i77-i90",
}
@Article{Novillo03,
Author="D. Novillo",
Title="{Tree SSA A New Optimization Infrastructure for GCC}",
Journal="In Proceedings of the 2003 GCC Summit",
Year="2003",
Pages="i181-i194",
}
@Article{Novillo04,
Author="D. Novillo",
Title="{Design and Implementation of Tree SSA}",
Journal="In Proceedings of the 2004 GCC Summit",
Year="2004",
Pages="i119-i130",
}
@Article{Novillo05,
Author="D. Novillo",
Title="{A Propagation Engine for GCC}",
Journal="In Proceedings of the 2005 GCC Summit",
Year="2005",
Pages="i175-i184",
}
@Article{PaX18,
Author="PaX",
Title="{Frequently Asked Questions About RAP}",
Journal="https://www.grsecurity.net/rap_faq",
Year="2018",
}
@Article{Pincus04,
Author="J. Pincus, B. Baker",
Title="{Beyond stack smashing: Recent advances in exploiting buffer overruns}",
Journal="Security & Privacy, IEEE.",
Year="2004",
Pages="i20-i27",
}
@Article{Ramasamy08,
Author="V. Ramasamy, P. Yuan, D. Chen, and R. Hundt",
Title="{Feedback-Directed Optimizations in GCC with Estimated Edge Profiles from Hardware Event Sampling}",
Journal="In Proceedings of the 2008 GCC Summit",
Year="2008",
Pages="i87-i101",
}
@Aricle{Shacham07,
Author="H. Shacham",
Title="{structural variant discovery by integrated paired-end and split-read analysis}",
Journal="Proceedings of the 14th ACM conference on Computer and communications security",
Year="2007",
Pages="i552-i561",
}
@Aricle{zet17,
Author="zet",
Title="{ARMv8.3-A PA在GCC里的相关实现}",
Journal="https://hardenedlinux.github.io/gnu/toolchains/security/2017/06/13/ARM_PA.html",
Year="2017",
}