共 31 条
[1]
Aciicmez O., 2007, P 2 ACM S INF COMP C, P312, DOI DOI 10.1145/1229285.1266999
[2]
Agat J., 2000, Conference Record of POPL'00: 27th ACM SIGPLAN-SIGACT. Symposium on Principles of Programming Languages. Papers Presented at the Symposium, P40, DOI 10.1145/325694.325702
[4]
Almeida JB, 2009, LECT NOTES COMPUT SC, V5825, P37, DOI 10.1007/978-3-642-04570-7_5
[6]
BARNETT M, 2004, LNCS, V3362, P49, DOI [DOI 10.1007/978-3-540-30569-9_3, 10.1007]
[7]
Secure information flow by self-composition
[J].
17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2004,
:100-114
[8]
Baudin Patrick, 2008, ACSL ANSI ISO C SPEC
[9]
Bernstein Daniel J., 2011, CRYPTOGRAPHY NACI
[10]
Ceara Dumitru, 2010, Proceedings of the IEEE Third International Conference on Software Testing Verification and Validation - Workshops (ICSTW 2010), P371, DOI 10.1109/ICSTW.2010.28