Author of the publication

Micro-Policies: Formally Verified, Tag-Based Security Monitors.

, , , , , , and . IEEE Symposium on Security and Privacy, page 813-830. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Properties for Stack Safety., , , , and . CoRR, (2021)Formalizing Stack Safety as a Security Property., , , , and . CSF, page 356-371. IEEE, (2023)Flexible Runtime Security Enforcement with Tagged C., , and . RV, volume 14245 of Lecture Notes in Computer Science, page 231-250. Springer, (2023)Intrinsically-typed definitional interpreters for imperative languages., , , , and . Proc. ACM Program. Lang., 2 (POPL): 16:1-16:34 (2018)Towards formally verified compilation of tag-based policy enforcement., , and . CPP, page 137-151. ACM, (2021)Eelco Visser: The Oregon Connection.. Eelco Visser Commemorative Symposium, volume 109 of OASIcs, page 27:1-27:6. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2023)SECOMP: Formally Secure Compilation of Compartmentalized C Programs., , , , , , , and . CoRR, (2024)Scopes and Frames Improve Meta-Interpreter Specialization., , and . ECOOP, volume 134 of LIPIcs, page 4:1-4:30. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2019)Suppl: A Flexible Language for Policies., and . APLAS, volume 8858 of Lecture Notes in Computer Science, page 176-195. Springer, (2014)Towards Formally Verified Compilation of Tag-Based Policy Enforcement., , and . CoRR, (2020)