{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T07:38:21Z","timestamp":1725608301281},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/nlpke.2011.6138200","type":"proceedings-article","created":{"date-parts":[[2012,2,16]],"date-time":"2012-02-16T18:37:38Z","timestamp":1329417458000},"page":"233-237","source":"Crossref","is-referenced-by-count":1,"title":["Memory errors prevention technology for C\/C++ program based on probability"],"prefix":"10.1109","author":[{"given":"Jingfeng","family":"Xue","sequence":"first","affiliation":[]},{"given":"Changzhen","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Hongyu","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Modeling of malicious code propagations in Internet of things","author":"zhaowen","year":"2011","journal-title":"China Communications"},{"journal-title":"Exploring information leakage in third-party compute clouds","year":"0","author":"ristenpart","key":"ref11"},{"key":"ref12","article-title":"Intrusion detection algorithm based on model checking interval temporal logic","author":"weijun","year":"2011","journal-title":"China Communications"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866371"},{"key":"ref14","article-title":"Towards a source-code oriented attestation","author":"anbang","year":"2009","journal-title":"China Communications"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2008.4771780"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1409360.1409382"},{"key":"ref17","article-title":"Efficient probabilistic memory safety","author":"berger","year":"2007","journal-title":"Technical Report UMCS TR-2007-17"},{"key":"ref18","article-title":"Prediction and Prevention of Uncorrectable Memory Errors","author":"chessin","year":"2009","journal-title":"Patent application number"},{"key":"ref19","article-title":"VAdve. Backwards-Compatible Array Bounds Checking for C with Very Low Overhead","author":"dhurjati","year":"2006","journal-title":"Proceedings of International Conference on Software Engineering 2006"},{"article-title":"Improving software security with a C pointer analysis","year":"0","author":"avots","key":"ref4"},{"key":"ref3","article-title":"A memory soft error measurement on production systems","author":"li","year":"2007","journal-title":"USENIX ATC"},{"key":"ref6","article-title":"Gene Novark: Grace: safe multithreaded programming for C\/C++","author":"berger","year":"2009","journal-title":"OOPSLA"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1555349.1555372"},{"key":"ref8","article-title":"Risk identification and prevention to the intelligent network implementation","author":"yumei","year":"2009","journal-title":"China Communications"},{"key":"ref7","article-title":"Principles and defense strategies of DNS cache poisoning","author":"chong","year":"2009","journal-title":"China Communications"},{"key":"ref2","article-title":"Using Valgrind to detect undefined value errors with bit-precision","author":"seward","year":"2005","journal-title":"Proceedings of the USENIX Annual Technical Conference"},{"year":"2011","key":"ref1","article-title":"US-CERT vulnerability notes"},{"key":"ref9","article-title":"A realistic evaluation of memory hardware errors and software system susceptibility","author":"li","year":"2010","journal-title":"USENIX ATC"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1133999"},{"year":"2011","key":"ref21"}],"event":{"name":"2011 7th International Conference on Natural Language Processing and Knowledge Engineering (NLPKE)","start":{"date-parts":[[2011,11,27]]},"location":"Tokushima, Japan","end":{"date-parts":[[2011,11,29]]}},"container-title":["2011 7th International Conference on Natural Language Processing and Knowledge Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6125888\/6137766\/06138200.pdf?arnumber=6138200","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T14:13:47Z","timestamp":1490105627000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6138200\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/nlpke.2011.6138200","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}