M. Abadi, M. Budiu, ´. U. Erlingsson, and J. Ligatti, Control-flow integrity principles, implementations, and applications, vol.13, 2009.
DOI : 10.1145/1609956.1609960

M. Abadi and G. D. Plotkin, On protection by layout randomization, vol.15, 2012.
DOI : 10.1109/csf.2010.30

URL : http://www.cs.ucsc.edu/%7Eabadi/Papers/paper-csf-long.pdf

J. P. Anderson, Computer security technology planning study, 1972.
DOI : 10.21236/ad0772806

URL : http://www.dtic.mil/cgi-bin/GetTRDoc?AD=AD0772806&Location=U2&doc=GetTRDoc.pdf

A. Azevedo-de-amorim, N. Collins, A. Dehon, D. Demange, C. Hrit¸cuhrit¸cu et al., A verified informationflow architecture, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00918847

M. Budiu, ´. U. Erlingsson, and M. Abadi, Architectural support for software-based protection, 2006.
DOI : 10.1145/1181309.1181316

URL : http://research.microsoft.com/users/mbudiu/asid06.pdf

A. Chlipala, The Bedrock structured programming system: Combining generative metaprogramming and Hoare logic in an extensible program verifier, ICFP, 2013.
DOI : 10.1145/2544174.2500592

URL : http://dl.acm.org/ft_gateway.cfm?id=2500592&type=pdf

J. A. Clause, I. Doudalis, A. Orso, and M. Prvulovic, Effective memory protection using dynamic tainting. ASE, 2007.
DOI : 10.1145/1321631.1321673

URL : http://www-static.cc.gatech.edu/~orso/papers/clause.doudalis.orso.prvulovic.pdf

J. Criswell, N. Dautenhahn, and V. Adve, KCoFI: Complete control-flow integrity for commodity operating system kernels, IEEE S&P, 2014.
DOI : 10.1109/sp.2014.26

URL : http://sva.cs.illinois.edu/pubs/KCoFI-Oakland-2014.pdf

L. Davi, P. Koeberl, and A. Sadeghi, Hardware-assisted fine-grained control-flow integrity: Towards efficient protection of embedded systems against software exploitation, 2014.
DOI : 10.1109/dac.2014.6881460

L. Davi, A. Sadeghi, D. Lehmann, and F. Monrose, Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection, 2014.

U. Dhawan, C. Hrit¸cuhrit¸cu, R. Rubin, N. Vasilakis, S. Chiricescu et al., Architectural support for softwaredefined metadata processing, 2015.
DOI : 10.1145/2775054.2694383

URL : https://hal.archives-ouvertes.fr/hal-01102378

U. Dhawan, A. Kwon, E. Kadric, C. Hrit¸cuhrit¸cu, B. C. Pierce et al., Hardware support for safety interlocks and introspection, 2012.
DOI : 10.1109/sasow.2012.11

URL : http://www.crash-safe.org/sites/default/files/interlocks_ahns2012.pdf

´. U. Erlingsson and F. B. Schneider, IRM enforcement of Java stack inspection, IEEE S&P, 2000.
DOI : 10.1109/secpri.2000.848461

URL : http://www.cs.cornell.edu/fbs/publications/sasiOakland.ps

E. Göktasgöktas¸, E. Athanasopoulos, H. Bos, and G. Portokalidis, Out of control: Overcoming control-flow integrity, IEEE S&P, 2014.

K. W. Hamlen, J. G. Morrisett, and F. B. Schneider, Computability classes for enforcement mechanisms, TOPLAS, vol.28, issue.1, pp.175-205, 2006.
DOI : 10.1145/1111596.1111601

URL : http://www.cs.cornell.edu/fbs/publications/EnfClasses.pdf

C. Hrit¸cuhrit¸cu, M. Greenberg, B. Karel, B. C. Pierce, and G. Morrisett, All your IFCException are belong to us, IEEE S&P, 2013.

J. B. Jensen, N. Benton, and A. Kennedy, High-level separation logic for low-level code, 2013.
DOI : 10.1145/2480359.2429105

J. Kroll, G. Stewart, and A. Appel, Portable software fault isolation, 2014.
DOI : 10.1109/csf.2014.10

URL : http://doi.org/10.1109/csf.2014.10

A. Kwon, U. Dhawan, J. M. Smith, T. F. Knight, and A. Dehon, Lowfat pointers: compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security, 2013.

X. Leroy and S. Blazy, Formal verification of a C-like memory model and its uses for verifying program transformations, JAR, vol.41, issue.1, pp.1-31, 2008.
DOI : 10.1007/s10817-008-9099-0

URL : https://hal.archives-ouvertes.fr/inria-00289542

J. Ligatti, L. Bauer, and D. Walker, Edit automata: enforcement mechanisms for run-time security policies, IJISS, vol.4, issue.1-2, pp.2-16, 2005.
DOI : 10.1007/s10207-004-0046-8

URL : http://www.cs.princeton.edu/~jligatti/papers/TR-681-03.pdf

A. J. Mashtizadeh, A. Bittau, D. Maziéres, and D. Boneh, Cryptographically enforced control flow integrity

J. H. Morris, Protection in programming languages, CACM, vol.16, issue.1, pp.15-21, 1973.

G. Morrisett, G. Tan, J. Tassarotti, J. Tristan, and E. Gan, RockSalt: better, faster, stronger SFI for the x86, 2012.

S. Nagarakatte, M. M. Martin, and S. Zdancewic, Hardware-Enforced Comprehensive Memory Safety, IEEE Micro, vol.33, issue.3, pp.38-47, 2013.

S. Nagarakatte, J. Zhao, M. M. Martin, and S. Zdancewic, SoftBound: highly compatible and complete spatial memory safety for C. PLDI, 2009.

S. Nagarakatte, J. Zhao, M. M. Martin, and S. Zdancewic, CETS: compiler enforced temporal safety for C. ISMM, 2010.

B. Niu and G. Tan, Modular control-flow integrity. PLDI, 2014.

F. B. Schneider, Enforceable security policies, TISSEC, vol.3, issue.1, pp.30-50, 2000.

G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas, Secure program execution via dynamic information flow tracking, 2004.

E. Sumii and B. C. Pierce, A bisimulation for dynamic sealing, TCS, vol.375, issue.13, pp.169-192, 2007.

R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham, Efficient softwarebased fault isolation, SOSP, 1993.

B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth et al., Native Client: a sandbox for portable, vol.53, pp.91-99, 2010.

C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres et al., Practical Control Flow Integrity & Randomization for Binary Executables, IEEE S&P, 2013.

L. Zhao, G. Li, B. D. Sutter, and J. Regehr, ARMor: fully verified software fault isolation, 2011.