1. Periklis Akritidis , Manuel Costa , Miguel Castro , and Steven Hand . 2009 . Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors . In Proceedings of the USENIX security symposium(USENIX Security ’09) . Montreal, Canada. https://www.usenix.org/legacy/event/sec09/tech/full_papers/sec09_memory.pdf Periklis Akritidis, Manuel Costa, Miguel Castro, and Steven Hand. 2009. Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors. In Proceedings of the USENIX security symposium(USENIX Security ’09). Montreal, Canada. https://www.usenix.org/legacy/event/sec09/tech/full_papers/sec09_memory.pdf
2. Arm Limited 2019. Arm Architecture Reference Manual Armv8 for Armv8-A architecture profile. Arm Limited. https://developer.arm.com/documentation/ddi0487/ea. Accessed 2023-06-30. Arm Limited 2019. Arm Architecture Reference Manual Armv8 for Armv8-A architecture profile. Arm Limited. https://developer.arm.com/documentation/ddi0487/ea. Accessed 2023-06-30.
3. A study of the allocation behavior of C++ programs
4. Jeremy Condit , Matthew Harren , Zachary Anderson , David Gay , and George C. Necula . 2007. Dependent Types for Low-Level Programming . In Programming Languages and Systems, Rocco De Nicola (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg , 520–535. Jeremy Condit, Matthew Harren, Zachary Anderson, David Gay, and George C. Necula. 2007. Dependent Types for Low-Level Programming. In Programming Languages and Systems, Rocco De Nicola (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 520–535.
5. SHAKTI-MS: a RISC-V processor for memory safety in C