1. Caja. Attack vectors for privilege escalation (2012). http://code.google.com/p/google-caja/wiki/AttackVectors
2. Agten, P., Jacobs, B., Piessens, F.: Sound modular verification of C code executing in an unverified context. In: POPL (2015). https://lirias.kuleuven.be/bitstream/123456789/471365/3/sound-verification.pdf
3. Ahmed, A., Fluet, M., Morrisett, G.: $${\rm L}^3$$: a linear language with locations. Fundam. Inform. 77(4), 397–449 (2007). http://content.iospress.com/articles/fundamenta-informaticae/fi77-4-06
4. Askarov, A., Hunt, S., Sabelfeld, A., Sands, D.: Termination-insensitive noninterference leaks more than just a bit. In: ESORICS (2008). http://www.cse.chalmers.se/~andrei/esorics08.pdf
5. Azevedo de Amorim, A., Dénès, M., Giannarakis, N., Hriţcu, C., Pierce, B.C., Spector-Zabusky, A., Tolmach, A.: Micro-policies: formally verified, tag-based security monitors. In: S&P, Oakland (2015). http://prosecco.gforge.inria.fr/personal/hritcu/publications/micro-policies.pdf