共 48 条
[1]
Almeida Jose Carlos Bacelar, 2016, 25 USENIX SEC S USEN
[2]
WYSINWYX: What You See Is Not What You eXecute
[J].
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS,
2010, 32 (06)
[3]
Secure information flow by self-composition
[J].
17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2004,
:100-114
[4]
Barthe Gilles, 2011, FM 2011: Formal Methods. Proceedings 17th International Symposium on Formal Methods, P200, DOI 10.1007/978-3-642-21437-0_17
[5]
Barthe G., 2014, ACM SIGSAC C COMP CO
[6]
An Abstract Model of Certificate Translation
[J].
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS,
2011, 33 (04)
[7]
Certificate Translation for Optimizing Compilers
[J].
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS,
2009, 31 (05)
[8]
Bernstein Daniel J., 2012, Progress in Cryptology - LATINCRYPT 2012. Proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, P159, DOI 10.1007/978-3-642-33481-8_9
[9]
Bertot Yves, 2008, LANGUAGE ENG RIGOROU, P153, DOI Springer
[10]
Blazy S., 2016, P 21 ACM SIGPLAN INT