llsec.bib

Abadi1998Protection-in-P
Protection in Programming-Language Translations
Abadi, M.
ICALP      868-883  (1998)
http://www.soe.ucsc.edu/~abadi/Papers/fullabs-srcreport.ps
Fournet2003Stack-inspectio
Stack inspection: Theory and variants
Fournet, C. and Gordon, A. D.
  ACM Trans. Program. Lang. Syst.  25  360-399  (2003)
http://doi.acm.org/10.1145/641909.641912
Barthe2004Security-Types-
Security Types Preserving Compilation: (Extended Abstract)
Barthe, G. and Basu, A. and Rezk, T.
VMCAI      2-15  (2004)
ftp://ftp-sop.inria.fr/everest/publis/2004/BBR04vmcai.ps.gz
Abadi2005A-Theory-of-Sec
A Theory of Secure Control Flow
Abadi, M. and Budiu, M. and Erlingsson, Ú. and Ligatti, J.
ICFEM      111-124  (2005)
http://dx.doi.org/10.1007/11576280_9
Abadi2005Control-flow-in
Control-flow integrity
Abadi, M. and Budiu, M. and Erlingsson, Ú. and Ligatti, J.
ACM Conference on Computer and Communications Security      340-353  (2005)
http://doi.acm.org/10.1145/1102120.1102165
Barthe2007Security-of-Mul
Security of Multithreaded Programs by Compilation
Barthe, G. and Rezk, T. and Russo, A. and Sabelfeld, A.
ESORICS      2-18  (2007)
http://www.cs.chalmers.se/~andrei/esorics07.pdf