[75] Gene Novark and Emery D Berger. Dieharder: securing the heap. In Proceedings of the 17th ACM conference on Computer and communications security, pages 573–584. ACM, 2010.
[74] Gor V Nishanov and Sibylle Schupp. Garbage collection in generic libraries. ACM SIGPLAN Notices, 34(3):86–96, 1999.
[70] Gleb Naumovich and Nasir Memon. Preventing piracy, reverse engineering, and tampering. Computer, 36(7):64–71, 2003.
[6] ARM. The mebed os uvisor. https://www.mbed.com/en/ technologies/security/uvisor/.
[56] Roland Buschkes Pavel Laskov. Detection of intrusions and malware & vulner- ¨ ability assessment. 2006.
[49] IAR. Execute in ram after copying from flash or rom. https://www.iar.com/support/tech-notes/general/ execute-in-ram-after-copying-from-flashrom-v5. 20-and-later/.
[47] ARM Holdings. Armv7-m architecture reference manual, 2010.
[40] Sanjay Ghemawat and Paul Menage. Tcmalloc: Thread-caching malloc, 2007. URL {http://goog-perftools. sourceforge. net/doc/tcmalloc. html}, 2005.
[2] Periklis Akritidis. Cling: A memory allocator to mitigate dangling pointers. In USENIX Security Symposium, pages 177–192, 2010.
You can run but you can ’ t read : Prevent¨ ing disclosure exploits in executable code .
pages 1342– 1353[2014]
Watchdoglite : Hardware-accelerated compiler-based pointer checking . In Proceedings of Annual IEEE/ACM International Symposium on Code Generation and Optimization
page 175[2014]
Watchdog : Hardware for safe and secure manual memory management and full memory safety . In ACM SIGARCH Computer Architecture News
volume 40 , pages 189–200[2012]
Vuzzer : Application-aware evolutionary fuzzing
volume 17 , pages 1–14 ,[2017]
Uniprocessor garbage collection techniques . In Memory Management
pages 1–42[1992]
Undangle : early detection of dangling pointers in use-after-free and double-free vulnerabilities .
[2012]
Tresor runs encryption ¨ securely outside ram
volume 17[2011]
The parsec benchmark suite : Characterization and architectural implications
[2008]
The inlined reference monitor approach to security policy ´ enforcement
[2003]
Technical report , Technical Report TR2008-120
Cited on[2008]
SpecCpu2006 benchmark descriptions
34 ( 4 ) :1–17[2006]
Spatio-temporalContext reduction : A pointer-analysis-based static approach for detecting use-after-free vulnerabilities .