{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:55:28Z","timestamp":1725501328602},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540775591"},{"type":"electronic","value":"9783540775607"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77560-7_8","type":"book-chapter","created":{"date-parts":[[2008,1,17]],"date-time":"2008-01-17T06:13:02Z","timestamp":1200550382000},"page":"99-113","source":"Crossref","is-referenced-by-count":1,"title":["Fast Bounds Checking Using Debug Register"],"prefix":"10.1007","author":[{"given":"Tzi-cker","family":"Chiueh","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Perens, B.: Electric fence: a malloc() debugger for linux and unix. \n                    \n                      http:\/\/perens.com\/FreeSoftware\/"},{"key":"8_CR2","unstructured":"Bentley, C., Watterson, S.A., Lowenthal, D.K.: A comparison of array bounds checking on superscalar and vliw architectures. In: The annual IEEE Workshop on Workload Characterization (submitted)"},{"key":"8_CR3","unstructured":"Lam, L.-C., Chiueh, T.-C.: Checking array bound violation using segmentation hardware. In: DSN 2005. Proceedings of 2005 International Conference on Dependable Systems and Networks (June 2005)"},{"key":"8_CR4","unstructured":"Cowan, C., et al.: Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks. In: Proc. 7th USENIX Security Conference, San Antonio, Texas, pp. 63\u201378 (January 1998)"},{"key":"8_CR5","unstructured":"GCC. Bounds-checking gcc, \n                    \n                      http:\/\/www.gnu.org\/software\/gcc\/projects\/bp\/main.html"},{"key":"8_CR6","unstructured":"Pearson, G.: Array bounds checking with turbo c. Dr. Dobb\u2019s Journal of Software Tools\u00a016(5) 72, 74, 78\u201379, 81\u201382, 104\u2013107 (1991)"},{"key":"8_CR7","unstructured":"Patil, H., Fischer, C.N.: Efficient run-time monitoring using shadow processing. In: Proceedings of Automated and Algorithmic Debugging Workshop, pp. 119\u2013132 (1995)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Xi, H., Pfenning, F.: Eliminating array bound checking through dependent types. In: SIGPLAN Conference on Programming Language Design and Implementation, pp. 249\u2013257 (1998)","DOI":"10.1145\/277650.277732"},{"key":"8_CR9","unstructured":"Xi, H., Xia, S.: Towards array bound check elimination in java virtual machine language. In: Proceedings of CASCON 1999, Mississauga, Ontario, pp. 110\u2013125 (November 1999)"},{"key":"8_CR10","unstructured":"Intel. IA-32 Intel Architecture Software Developer\u2019s Manual vol. 2 Instruction Set Reference, \n                    \n                      http:\/\/www.intel.com\/design\/Pentium4\/manuals\/"},{"key":"8_CR11","unstructured":"Intel. Ia-32 intel architecture software developer\u2019s manual. volume 3: System programming guide, \n                    \n                      http:\/\/developer.intel.com\/design\/pentium4\/manuals\/245472.htm"},{"issue":"2","key":"8_CR12","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1145\/151333.151392","volume":"1","author":"J.M. Asuru","year":"1992","unstructured":"Asuru, J.M.: Optimization of array subscript range checks. ACM letters on Programming Languages and Systems\u00a01(2), 109\u2013118 (1992)","journal-title":"ACM letters on Programming Languages and Systems"},{"key":"8_CR13","unstructured":"Jones, R.W.M., Kelly, P.H.J.: Backwards-compatible bounds checking for arrays and pointers in c programs. In: Proceedings of Automated and Algorithmic Debugging Workshop, pp. 13\u201326 (1997)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Kolte, P., Wolfe, M.: Elimination of redundant array subscript range checks. In: SIGPLAN Conference on Programming Language Design and Implementation, pp. 270\u2013278 (1995)","DOI":"10.1145\/207110.207160"},{"key":"8_CR15","unstructured":"Prasad, M., Chiueh, T.-C.: A binary rewriting approach to stack-based buffer overflow attacks. In: Proceedings of 2003 USENIX Conference (June 2003)"},{"key":"8_CR16","unstructured":"Qin, F., Lu, S., Zhou, Y.: Safemem: Exploiting ecc-memory for detecting memory leaks and memory corruption during production runs. In: HPCA 2005. Proceedings of the 11th International Symposium on High-Performance Computer Architecture (February 2005)"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Gupta, R.: A fresh look at optimizing array bound checking. In: SIGPLAN Conference on Programming Language Design and Implementation, pp. 272\u2013282 (1990)","DOI":"10.1145\/93542.93581"},{"issue":"1-4","key":"8_CR18","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/176454.176507","volume":"2","author":"R. Gupta","year":"1993","unstructured":"Gupta, R.: Optimizing array bound checks using flow analysis. ACM Letters on Programming Languages and Systems\u00a02(1-4), 135\u2013150 (1993)","journal-title":"ACM Letters on Programming Languages and Systems"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Bodik, R., Gupta, R., Sarkar, V.: Abcd: eliminating array bounds checks on demand. In: SIGPLAN Conference on Programming Language Design and Implementation, pp. 321\u2013333 (2000)","DOI":"10.1145\/349299.349342"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Chiueh, T.-C., Hsu, F.-H.: Rad: A compiler time solution to buffer overflow attacks. In: ICDCS. Proceedings of International Conference on Distributed Computing Systems, Phoenix, Arizona (April 2001)","DOI":"10.1109\/ICDSC.2001.918971"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Chiueh, T.-C., Venkitachalam, G., Pradhan, P.: Integrating segmentation and paging protection for safe, efficient and transparent software extensions. In: Proceedings of 17th ACM Symposium on Operating Systems Principles, Charleston, SC (December 1999)","DOI":"10.1145\/319151.319161"}],"container-title":["Lecture Notes in Computer Science","High Performance Embedded Architectures and Compilers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77560-7_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:44:30Z","timestamp":1619520270000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77560-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540775591","9783540775607"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77560-7_8","relation":{},"subject":[]}}