Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

GNU Compiler Collection

Known as: Libgcc, GNU/GCC, GCC 
The GNU Compiler Collection (GCC) is a compiler system produced by the GNU Project supporting various programming languages. GCC is a key component… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Control Flow Integrity (CFI) provides a strong protection against modern control-flow hijacking attacks. However, performance and… Expand
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Highly Cited
2011
Highly Cited
2011
Compilers should be correct. To improve the quality of C compilers, we created Csmith, a randomized test-case generation tool… Expand
  • figure 2
  • table 1
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2010
Highly Cited
2010
 
Highly Cited
2009
Highly Cited
2009
Using the GNU COMPILER Collection. A GNU Manual for GCC Version 4.3.3. This manual documents how to use the GNU compilers, as… Expand
Highly Cited
2006
Highly Cited
2006
Open source development projects typically support an open bug repository to which both developers and users can report bugs. The… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 4
Highly Cited
2003
Highly Cited
2003
Transmeta's Crusoe microprocessor is a full, system-level implementation of the x86 architecture, comprising a native VLIW… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
Highly Cited
2002
Highly Cited
2002
In this paper, we present a new algorithm for partial program verification that runs in polynomial time and space. We are… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Highly Cited
2000
Highly Cited
2000
 
Highly Cited
1998
Highly Cited
1998
  • C. Cowan
  • USENIX Security Symposium
  • 1998
  • Corpus ID: 2358856
This paper presents a systematic solution to the persistent problem of buffer overflow attacks. Buffer overflow attacks gained… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Highly Cited
1997
Highly Cited
1997
This paper presents a new approach to enforcing array bounds and pointer checking in the C language Check ing is rigorous in the… Expand
  • figure I