Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation - PLDI '03 2003
DOI: 10.1145/781154.781157
|View full text |Cite
|
Sign up to set email alerts
|

CCured in the real world

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2004
2004
2015
2015

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 24 publications
(33 citation statements)
references
References 0 publications
0
33
0
Order By: Relevance
“…Many expressions are equivalent to normalized expressions. For example, suppose x is a structure variable with type struct{int a [3]; int b [2];}, then x.a [1] is equivalent to * ((int * )((unsigned)&x+4)), and x.b [1] is equivalent to * ((int * )((unsigned)&x+16)). However, there is no normalized expression which is equivalent to a lvalue that contains "bit field".…”
Section: A Normalized Expressionmentioning
confidence: 99%
See 1 more Smart Citation
“…Many expressions are equivalent to normalized expressions. For example, suppose x is a structure variable with type struct{int a [3]; int b [2];}, then x.a [1] is equivalent to * ((int * )((unsigned)&x+4)), and x.b [1] is equivalent to * ((int * )((unsigned)&x+16)). However, there is no normalized expression which is equivalent to a lvalue that contains "bit field".…”
Section: A Normalized Expressionmentioning
confidence: 99%
“…Dynamic detection strategy [3], adds memory safety guarantees to programs by inserting run-time checks. Such approaches will incur performance penalties.…”
Section: Introductionmentioning
confidence: 99%
“…Safe dialects of C and C++ use techniques such as restriction in memory management to prevent any implementation errors. Examples of such methods are shown in [25,32,35].…”
Section: Countermeasures Against Software Attacksmentioning
confidence: 99%
“…While these techniques have been effectively used in finding software defects, they cannot be applied to runtime error-detection in applications. C-Cured [7] is a system to protect programs from memory errors using a combination of static checking and runtime assertions wherever static checks fail. While C-cured is effective in detecting software errors that violate memory safety, it cannot detect runtime errors resulting from hardware transient faults or software errors that do not violate memory safety.…”
Section: Related Workmentioning
confidence: 99%