Publisher
Springer Nature Switzerland
Reference30 articles.
1. Anderson, J.P.: Computer security technology planning study. Technical report ESD-TR-73-51, U.S. Air Force Electronic Systems Division (1972). http://csrc.nist.gov/publications/history/ande72.pdf
2. Armv8.5-a memory tagging extension white paper. https://developer.arm.com/-/media/Arm%20Developer%20Community/PDF/Arm_Memory_Tagging_Extension_Whitepaper.pdf
3. Austin, T.H., Flanagan, C.: Multiple facets for dynamic information flow. In: Proceedings of the 39th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2012, pp. 165–178. Association for Computing Machinery (2012). https://doi.org/10.1145/2103656.2103677
4. Azevedo de Amorim, A., et al.: A verified information-flow architecture. J. Comput. Secur. 24(6), 689–734 (2016). https://doi.org/10.3233/JCS-15784
5. Azevedo de Amorim, A., et al.: Micro-policies: formally verified, tag-based security monitors. In: 2015 IEEE Symposium on Security and Privacy, pp. 813–830 (2015). https://doi.org/10.1109/SP.2015.55