169 lines
4.4 KiB
BibTeX
169 lines
4.4 KiB
BibTeX
@Article{Abadi05,
|
||
Author="M. Abadi, M. Budiu, Ú. Erlingsson, and J. Ligatti",
|
||
Title={"Control-flow integrity: Principles, implementations, and applications"},
|
||
Journal="Proceedings of the 12th ACM conference on Computer and communications security",
|
||
Year="2005",
|
||
Pages="i340-i353",
|
||
}
|
||
|
||
@Article{Aumasson12,
|
||
Author="JP. Aumasson, D.J. Bernstein",
|
||
Title="{SipHash: A Fast Short-Input PRF}",
|
||
Journal="Progress in Cryptology - INDOCRYPT",
|
||
Year="2012",
|
||
Pages="i489-i508",
|
||
}
|
||
|
||
@Article{Berlin05,
|
||
Author="D. Berlin",
|
||
Title="{Structure aliasing in GCC}",
|
||
Journal="In Proceedings of the 2005 GCC Summit",
|
||
Year="2005",
|
||
Pages="i25-i36",
|
||
}
|
||
|
||
@Article{C11-standard,
|
||
Author="ISO/IEC",
|
||
Title="{Information technology — Programming languages — C}",
|
||
Journal="ISO/IEC 9899:2011",
|
||
Year="2011",
|
||
Pages="i42",
|
||
}
|
||
|
||
@Article{Carlini14,
|
||
Author="N. Carlini, D. Wagner",
|
||
Title="{ROP is still dangerous: Breaking modern defenses.}",
|
||
Journal="In USENIX Security Symposium",
|
||
Year="2014",
|
||
Pages="i385-i399",
|
||
}
|
||
|
||
@Article{Gupta93,
|
||
Author="R. Gupta",
|
||
Title="{Optimizing array bound checks using flow analysis}",
|
||
Journal="ACM Letters on Programming Languages and Systems",
|
||
Year="1993",
|
||
Pages="i135-i150",
|
||
}
|
||
|
||
@Article{Glek10,
|
||
Author="T. Glek, J. Hubicka",
|
||
Title="{Optimizing real-world applications with GCC Link Time Optimization}",
|
||
Journal="In Proceedings of the 2010 GCC Summit",
|
||
Year="2010",
|
||
}
|
||
|
||
@Article{gccinternals,
|
||
Author="GCC-internals",
|
||
Title="{Chapter rtl and plugins}",
|
||
Journal="GNU Compiler Collection (GCC) Internals",
|
||
Year="2017",
|
||
}
|
||
|
||
@Article{Hubicka05,
|
||
Author="J. Hubicka",
|
||
Title="{Profile driven optimisations in GCC}",
|
||
Journal="In Proceedings of the 2005 GCC Summit",
|
||
Year="2005",
|
||
Pages="i107-i124",
|
||
}
|
||
|
||
@Article{Hardenedlinux18,
|
||
Author="zet",
|
||
Title="{hl-cfi project}",
|
||
Journal="https://github.com/hardenedlinux/RAP-optimizations",
|
||
Year="2018",
|
||
}
|
||
|
||
@Article{Hardekopf09,
|
||
Author="B. Hardekopf, C. Lin",
|
||
Title="{Semi-sparse flow-sensitive pointer analysis}",
|
||
Journal="Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages",
|
||
Year="2009",
|
||
Pages="i226-i238",
|
||
}
|
||
|
||
@Article{Krahmer05,
|
||
Author="S. Krahmer",
|
||
Title="{x86-64 buffer overflow exploits and the borrowed code chunks exploitation technique}",
|
||
Year="2005",
|
||
}
|
||
|
||
@Article{Merrill03,
|
||
Author="J. Merrill",
|
||
Title="{GENERIC and GIMPLE: A New Tree Representation for Entire Functions}",
|
||
Journal="In Proceedings of the 2003 GCC Summit",
|
||
Year="2003",
|
||
Pages="i171-i180",
|
||
}
|
||
|
||
@Article{Makarov07,
|
||
Author="V N. Makarov",
|
||
Title="{The integrated register allocator for GCC}",
|
||
Journal="In Proceedings of the 2007 GCC Summit",
|
||
Year="2007",
|
||
Pages="i77-i90",
|
||
}
|
||
|
||
@Article{Novillo03,
|
||
Author="D. Novillo",
|
||
Title="{Tree SSA – A New Optimization Infrastructure for GCC}",
|
||
Journal="In Proceedings of the 2003 GCC Summit",
|
||
Year="2003",
|
||
Pages="i181-i194",
|
||
}
|
||
|
||
@Article{Novillo04,
|
||
Author="D. Novillo",
|
||
Title="{Design and Implementation of Tree SSA}",
|
||
Journal="In Proceedings of the 2004 GCC Summit",
|
||
Year="2004",
|
||
Pages="i119-i130",
|
||
}
|
||
|
||
@Article{Novillo05,
|
||
Author="D. Novillo",
|
||
Title="{A Propagation Engine for GCC}",
|
||
Journal="In Proceedings of the 2005 GCC Summit",
|
||
Year="2005",
|
||
Pages="i175-i184",
|
||
}
|
||
|
||
@Article{PaX18,
|
||
Author="PaX",
|
||
Title="{Frequently Asked Questions About RAP}",
|
||
Journal="https://www.grsecurity.net/rap_faq",
|
||
Year="2018",
|
||
}
|
||
|
||
@Article{Pincus04,
|
||
Author="J. Pincus, B. Baker",
|
||
Title="{Beyond stack smashing: Recent advances in exploiting buffer overruns}",
|
||
Journal="Security & Privacy, IEEE.",
|
||
Year="2004",
|
||
Pages="i20-i27",
|
||
}
|
||
|
||
@Article{Ramasamy08,
|
||
Author="V. Ramasamy, P. Yuan, D. Chen, and R. Hundt",
|
||
Title="{Feedback-Directed Optimizations in GCC with Estimated Edge Profiles from Hardware Event Sampling}",
|
||
Journal="In Proceedings of the 2008 GCC Summit",
|
||
Year="2008",
|
||
Pages="i87-i101",
|
||
}
|
||
|
||
@Aricle{Shacham07,
|
||
Author="H. Shacham",
|
||
Title="{structural variant discovery by integrated paired-end and split-read analysis}",
|
||
Journal="Proceedings of the 14th ACM conference on Computer and communications security",
|
||
Year="2007",
|
||
Pages="i552-i561",
|
||
}
|
||
|
||
@Aricle{zet17,
|
||
Author="zet",
|
||
Title="{ARMv8.3-A PA在GCC里的相关实现}",
|
||
Journal="https://hardenedlinux.github.io/gnu/toolchains/security/2017/06/13/ARM_PA.html",
|
||
Year="2017",
|
||
}
|