RAP-optimizations/doc/PAX-rap-optimizations-paper/references.bib

169 lines
4.4 KiB
BibTeX
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

@Article{Abadi05,
Author="M. Abadi, M. Budiu, Ú. Erlingsson, and J. Ligatti",
Title={"Control-flow integrity: Principles, implementations, and applications"},
Journal="Proceedings of the 12th ACM conference on Computer and communications security",
Year="2005",
Pages="i340-i353",
}
@Article{Aumasson12,
Author="JP. Aumasson, D.J. Bernstein",
Title="{SipHash: A Fast Short-Input PRF}",
Journal="Progress in Cryptology - INDOCRYPT",
Year="2012",
Pages="i489-i508",
}
@Article{Berlin05,
Author="D. Berlin",
Title="{Structure aliasing in GCC}",
Journal="In Proceedings of the 2005 GCC Summit",
Year="2005",
Pages="i25-i36",
}
@Article{C11-standard,
Author="ISO/IEC",
Title="{Information technology — Programming languages — C}",
Journal="ISO/IEC 9899:2011",
Year="2011",
Pages="i42",
}
@Article{Carlini14,
Author="N. Carlini, D. Wagner",
Title="{ROP is still dangerous: Breaking modern defenses.}",
Journal="In USENIX Security Symposium",
Year="2014",
Pages="i385-i399",
}
@Article{Gupta93,
Author="R. Gupta",
Title="{Optimizing array bound checks using flow analysis}",
Journal="ACM Letters on Programming Languages and Systems",
Year="1993",
Pages="i135-i150",
}
@Article{Glek10,
Author="T. Glek, J. Hubicka",
Title="{Optimizing real-world applications with GCC Link Time Optimization}",
Journal="In Proceedings of the 2010 GCC Summit",
Year="2010",
}
@Article{gccinternals,
Author="GCC-internals",
Title="{Chapter rtl and plugins}",
Journal="GNU Compiler Collection (GCC) Internals",
Year="2017",
}
@Article{Hubicka05,
Author="J. Hubicka",
Title="{Profile driven optimisations in GCC}",
Journal="In Proceedings of the 2005 GCC Summit",
Year="2005",
Pages="i107-i124",
}
@Article{Hardenedlinux18,
Author="zet",
Title="{hl-cfi project}",
Journal="https://github.com/hardenedlinux/RAP-optimizations",
Year="2018",
}
@Article{Hardekopf09,
Author="B. Hardekopf, C. Lin",
Title="{Semi-sparse flow-sensitive pointer analysis}",
Journal="Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages",
Year="2009",
Pages="i226-i238",
}
@Article{Krahmer05,
Author="S. Krahmer",
Title="{x86-64 buffer overflow exploits and the borrowed code chunks exploitation technique}",
Year="2005",
}
@Article{Merrill03,
Author="J. Merrill",
Title="{GENERIC and GIMPLE: A New Tree Representation for Entire Functions}",
Journal="In Proceedings of the 2003 GCC Summit",
Year="2003",
Pages="i171-i180",
}
@Article{Makarov07,
Author="V N. Makarov",
Title="{The integrated register allocator for GCC}",
Journal="In Proceedings of the 2007 GCC Summit",
Year="2007",
Pages="i77-i90",
}
@Article{Novillo03,
Author="D. Novillo",
Title="{Tree SSA A New Optimization Infrastructure for GCC}",
Journal="In Proceedings of the 2003 GCC Summit",
Year="2003",
Pages="i181-i194",
}
@Article{Novillo04,
Author="D. Novillo",
Title="{Design and Implementation of Tree SSA}",
Journal="In Proceedings of the 2004 GCC Summit",
Year="2004",
Pages="i119-i130",
}
@Article{Novillo05,
Author="D. Novillo",
Title="{A Propagation Engine for GCC}",
Journal="In Proceedings of the 2005 GCC Summit",
Year="2005",
Pages="i175-i184",
}
@Article{PaX18,
Author="PaX",
Title="{Frequently Asked Questions About RAP}",
Journal="https://www.grsecurity.net/rap_faq",
Year="2018",
}
@Article{Pincus04,
Author="J. Pincus, B. Baker",
Title="{Beyond stack smashing: Recent advances in exploiting buffer overruns}",
Journal="Security & Privacy, IEEE.",
Year="2004",
Pages="i20-i27",
}
@Article{Ramasamy08,
Author="V. Ramasamy, P. Yuan, D. Chen, and R. Hundt",
Title="{Feedback-Directed Optimizations in GCC with Estimated Edge Profiles from Hardware Event Sampling}",
Journal="In Proceedings of the 2008 GCC Summit",
Year="2008",
Pages="i87-i101",
}
@Aricle{Shacham07,
Author="H. Shacham",
Title="{structural variant discovery by integrated paired-end and split-read analysis}",
Journal="Proceedings of the 14th ACM conference on Computer and communications security",
Year="2007",
Pages="i552-i561",
}
@Aricle{zet17,
Author="zet",
Title="{ARMv8.3-A PA在GCC里的相关实现}",
Journal="https://hardenedlinux.github.io/gnu/toolchains/security/2017/06/13/ARM_PA.html",
Year="2017",
}