1. Periklis Akritidis , Manuel Costa , Miguel Castro , and Steven Hand . 2009 . Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors . In Proceedings of the 18th USENIX Security Symposium (SEC ’09) . USENIX Association. https://www.usenix.org/conference/usenixsecurity09/technical-sessions/presentation/baggy-bounds-checking-efficient-and Periklis Akritidis, Manuel Costa, Miguel Castro, and Steven Hand. 2009. Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors. In Proceedings of the 18th USENIX Security Symposium (SEC ’09). USENIX Association. https://www.usenix.org/conference/usenixsecurity09/technical-sessions/presentation/baggy-bounds-checking-efficient-and
2. ARM Limited. 2019. ARM Architecture Reference Manual – ARMv8-A for ARMv8-A architecture profile. ARM DDI 0487E.a (ID070919). ARM Limited. 2019. ARM Architecture Reference Manual – ARMv8-A for ARMv8-A architecture profile. ARM DDI 0487E.a (ID070919).
3. Efficient detection of all pointer and array access errors
4. MITRE Corporation. 2022. 2022 CWE Top 25 Most Dangerous Software Errors. https://cwe.mitre.org/top25/archive/2022/2022_cwe_top25.html Accessed: 2023-03-15. MITRE Corporation. 2022. 2022 CWE Top 25 Most Dangerous Software Errors. https://cwe.mitre.org/top25/archive/2022/2022_cwe_top25.html Accessed: 2023-03-15.