{NetBricks}: Taking the V out of {NFV}

A Panda, S Han, K Jang, M Walls… - … USENIX Symposium on …, 2016 - usenix.org
The move from hardware middleboxes to software network functions, as advocated by NFV,
has proven more challenging than expected. Developing new NFs remains a tedious …

SoftBound: Highly compatible and complete spatial memory safety for C

S Nagarakatte, J Zhao, MMK Martin… - Proceedings of the 30th …, 2009 - dl.acm.org
The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking
are well known, yet C and C++ remain in widespread use. Unfortunately, C's arbitrary …

CETS: compiler enforced temporal safety for C

S Nagarakatte, J Zhao, MMK Martin… - Proceedings of the 2010 …, 2010 - dl.acm.org
Temporal memory safety errors, such as dangling pointer dereferences and double frees,
are a prevalent source of software bugs in unmanaged languages such as C. Existing …

TAJ: effective taint analysis of web applications

O Tripp, M Pistoia, SJ Fink, M Sridharan… - ACM Sigplan …, 2009 - dl.acm.org
Taint analysis, a form of information-flow analysis, establishes whether values from
untrusted methods and parameters may flow into security-sensitive operations. Taint …

The software model checker Blast Applications to software engineering

D Beyer, TA Henzinger, R Jhala… - International Journal on …, 2007 - Springer
B last is an automatic verification tool for checking temporal safety properties of C programs.
Given a C program and a temporal safety property, B last either statically proves that the …

What is keeping my phone awake? Characterizing and detecting no-sleep energy bugs in smartphone apps

A Pathak, A Jindal, YC Hu, SP Midkiff - Proceedings of the 10th …, 2012 - dl.acm.org
Despite their immense popularity in recent years, smartphones are and will remain severely
limited by their battery life. Preserving this critical resource has driven smartphone OSes to …

Design of the Java HotSpot™ client compiler for Java 6

T Kotzmann, C Wimmer, H Mössenböck… - ACM Transactions on …, 2008 - dl.acm.org
Version 6 of Sun Microsystems' Java HotSpot™ VM ships with a redesigned version of the
client just-in-time compiler that includes several research results of the last years. The client …

Enhancing Server Availability and Security Through Failure-Oblivious Computing.

MC Rinard, C Cadar, D Dumitran, DM Roy, T Leu… - Osdi, 2004 - usenix.org
We present a new technique, failure-oblivious computing, that enables servers to execute
through memory errors without memory corruption. Our safe compiler for C inserts checks …

Adaptive optimization in the Jalapeno JVM

M Arnold, S Fink, D Grove, M Hind… - Proceedings of the 15th …, 2000 - dl.acm.org
Future high-performance virtual machines will improve performance through sophisticated
online feedback-directed optimizations. this paper presents the architecture of the Jalapeño …

Archer: using symbolic, path-sensitive analysis to detect memory access errors

Y Xie, A Chou, D Engler - Proceedings of the 9th European software …, 2003 - dl.acm.org
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes
ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path …