1. AbsInt Angewandte Informatik GmbH. [n. d.]. Analyzing execution time with aiT. https://www.absint.com/ait/features.htm Accessed 10/07/2023. AbsInt Angewandte Informatik GmbH. [n. d.]. Analyzing execution time with aiT. https://www.absint.com/ait/features.htm Accessed 10/07/2023.
2. AbsInt Angewandte Informatik GmbH. 2005. AbsInt Enhances the Safety of the A380. https://www.absint.com/releases/050427.htm Accessed 10/07/2023. AbsInt Angewandte Informatik GmbH. 2005. AbsInt Enhances the Safety of the A380. https://www.absint.com/releases/050427.htm Accessed 10/07/2023.
3. Typestate-oriented programming
4. Inyoung Bang , Martin Kayondo , HyunGon Moon , and Yunheung Paek . 2023 . TRust: A Compilation Framework for In-process Isolation to Protect Safe Rust against Untrusted Code . In 32nd USENIX Security Symposium (USENIX Security 23) . USENIX Association, Anaheim, CA, 6947--6964. https://www.usenix.org/conference/usenixsecurity23/presentation/bang Inyoung Bang, Martin Kayondo, HyunGon Moon, and Yunheung Paek. 2023. TRust: A Compilation Framework for In-process Isolation to Protect Safe Rust against Untrusted Code. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 6947--6964. https://www.usenix.org/conference/usenixsecurity23/presentation/bang
5. Jenny Blessing , Michael A. Specter , and Daniel J. Weitzner. 202 1. You Really Shouldn't Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries. arXiv:2107.04940 [cs.CR] Jenny Blessing, Michael A. Specter, and Daniel J. Weitzner. 2021. You Really Shouldn't Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries. arXiv:2107.04940 [cs.CR]