Caroline Tice
- Research Area(s)
- Security, Privacy and Abuse Prevention
- Software Systems
Co-Authors
Google Publications
-
Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM
Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Úlfar Erlingsson, Luis Lozano, Geoff Pike
Proceedings of the 23rd Usenix Security Symposium, USENIX, San Diego, CA (2014)
Previous Publications
-
Cache Aware Data Layout Reorganization Optimization in GCC
Mostafa Hagog, Caroline Tice
Proceedings of the GCC Summit, 2005, pp. 69-92
-
A Practical, Robust Method for Generating Variable Range Tables
Caroline Tice, Susan Graham
Proceedings of the 10th International Conference on Compiler Construction 2001, Springer-Verlag, pp. 102-117
-
A Practical Approach for Recovery of Evicted Variables, SRC Research Report 167
Caroline Tice, Susan Graham
Compaq Systems Research Center (2000)
-
Key Instructions: Solving the Code Location Problem for Optimized Code, SRC Research Report 164
Caroline Tice, Susan Graham
Compaq Systems Research Center (2000)
-
OPTVIEW: A New Approach for Examining Optimized Code
Caroline Tice, Susan Graham
Proceedings of the ACM SIGPLAN Workshop on Program Analysis for Software Tools and Engineering (1998), pp. 19-26


