R. Hastings et al., “Purify: Fast Detection of Memory Leaks and Access Errors,” Proc. of the Winter USENIX Conference, 1992; pp. 125-136. |
T. M. Austin et al., “Efficient Detection of All Pointer and Array Access Errors,” Proc. of ACM SIGPLAN '94 Conf., Jun. 1994, pp. 290-301. |
K-P. Vo, “Vmalloc: A general and efficient memory allocator,” Software Practice & Experience, Mar. 1996, pp. 1-21. |
K-P. Vo et al., “Xept: A Software Instrumentation Method for Exception Handling,” 8th Int'l. Symposium on Software Reliability Engineering, 1997. |
Aleph One, “Smashing The Stack For Fun And Profit,” Phrack Magazine, 1998. |
C. Cowan et al., “StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks,” Proc. 7th USENIX Security Symposium, San Antonio, Texas, Jan. 26-29, 1998. |
F. Salles et al., “MetaKernels and Fault Containment Wrappers,” IEEE Int'l. Symposium on Fault-Tolerant Computing, 1999, pp. 22-29. |
D. Wagner et al., “A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities,” Proc. of the Network and Distributed System Security Symposium, 2000. |
A. Baratloo et al, “Transparent Run-Time Defense Against Stack Smashing Attacks,” Proc. of 2000 USENIX Annual Technical Conf., San Diego, CA, Jun. 18-23, 2000. |
BIND, http://www.securityfocus.com/vdb/bottom.html?vid=2303. |
Bruce Perens, ElectricFence: ftp//ftp.perens.com/pub/ElectricFence/. |