M. Abadi, Control-flow Integrity Principles, Implementations, and Applications, vol.13, pp.1094-9224, 2009.

J. Alglave, P. Cousot, «. Ogre, and P. , An Invariance Proof Method for Weak Consistency Models, Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, pp.3-18, 2017.

J. Alglave, L. Maranget, and M. Tautschnig, « Herding Cats: Modelling, Simulation, Testing, and Data Mining for Weak Memory, ACM SIGPLAN Notices, vol.49, 2013.

J. Ansel, « Language-independent Sandboxing of Just-in-time Compilation and Self-modifying Code, SIGPLAN Not, vol.46, pp.362-1340, 2011.

G. Balakrishnan and T. W. Reps, « Analyzing Memory Accesses in x86 Executables, vol.2985, pp.5-23, 2004.

F. Besson, S. Blazy, P. Wilke, «. A-concrete-memory-model-for-compcert, ». et al., Interactive Theorem Proving, vol.9236, pp.978-981, 2015.

F. Besson, Compiling Sandboxes: Formally Verified Software Fault Isolation, pp.499-524, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02316189

P. Biondi, Symp. sur la sécurité des technologies de l'information et des communications, 2017.

D. Brumley, BAP: A Binary Analysis Platform, vol.6806, pp.463-469, 2011.

E. Buchanan, « When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC, Proceedings of CCS 2008, pp.27-38, 2008.

M. Castro, Proceedings of the ACM SIGOPS 22Nd Symposium on Operating Systems Principles, SOSP '09, pp.45-58, 2009.

. Tis-committee, Executable and Linking Format specification 1, 1995.

P. Cousot, Proc. First IEEE & IFIP International Symp. on Theoretical Aspects of Software Engineering, TASE '07, pp.3-17, 2007.

P. Cousot, R. Cousot, and . Abstract, Unified Lattice Model for Static Analysis of Programs by Construction or Approximation of Fixpoints, Proc. of the 4th Symp. on Principles of Programming Languages, pp.238-252, 1977.

C. Domas, Breaking the x86 ISA, tech. rep, 2017.

C. Domas, . Sandsifter, and . Url,

T. Dullien, S. Porst, and «. Reil, A platform-independent intermediate representation of disassembled code for static code analysis, CanSecWest'09, 2009.

Ú. Erlingsson, Software Guards for System Address Spaces, Proceedings of the 7th Symposium on Operating Systems Design and Implementation, OSDI '06, pp.75-88, 2006.

B. Ford, R. Cox, and . Vx32, Lightweight User-level Sandboxing on the x86, USENIX 2008 Annual Technical Conference, ATC'08, pp.293-306, 2008.

A. Haas, « Bringing the Web Up to Speed with WebAssembly, Proc. of the 38th Conf. on Programming Language Design and Implementation, pp.978-979, 2017.

J. A. Drew-dean and . Kroll, BakerSFIeld: Bringing software fault isolation to x64, 2009.

J. Jourdan, Proc. of the 42Nd Symp. on Principles of Programming Languages, pp.247-259, 2015.

J. Kinder, Static Analysis of x86 Executables, 2010.

J. A. Kroll, G. Stewart, and A. W. Appel, Proceedings of the 2014 IEEE 27th Computer Security Foundations Symposium, CSF '14, pp.18-32, 2014.

X. Leroy, « Formal Verification of a Realistic Compiler, Commun. ACM, vol.52, pp.1-0782, 2009.

S. Mccamant and G. Morrisett, « Evaluating SFI for a CISC architecture, 15th USENIX Security Symposium, pp.209-224, 2006.

B. Mihaila and . Adaptable, Static Analysis of Executables for proving the Absence of Vulnerabilities, 2015.

A. Miné, Proc. of the Workshops on Automated Theory eXploration and on Invariant Generation, vol.17, pp.55-70, 2013.

G. Morrisett, Better, Faster, Stronger SFI for the x86 », in: SIGPLAN Not, vol.47, pp.362-1340, 2012.

S. Owens, S. Sarkar, and P. Sewell, A Better x86 Memory Model: x86-TSO, pp.391-407, 2009.

, REIL Specification, Zynamics

D. Sehr, Proceedings of the 19th USENIX Conference on Security, USENIX Security'10, pp.1-1, 2010.

J. ?ev?ík, A Verified Compiler for Relaxed-Memory Concurrency, Journal of the ACM (JACM), vol.60, 2013.

H. Shacham, The Geometry of Innocent Flesh on the Bone: Return-intolibc without Function Calls (on the x86), pp.552-61, 2007.

Y. Shoshitaishvili, State of) The Art of War: Offensive Techniques in Binary Analysis, IEEE Symp. on Security and Privacy, 2016.

J. Siefers, G. Tan, G. Morrisett, and . Robusta, Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10, pp.201-211, 2010.

C. Small and M. Seltzer, Abstract MiSFIT: A Tool for Constructing Safe Extensible C++ Systems, 1997.

M. Sun, « Bringing Java's Wild Native World Under Control, ACM Trans. Inf. Syst. Secur, vol.16, issue.3, pp.1094-9224, 2013.

, The Coq Development Team, Coq, version 8.7, 2017.

R. Wahbe, « Efficient Software-based Fault Isolation, SIGOPS Oper. Syst. Rev, vol.27, pp.163-5980, 1993.

B. Yee, « Native Client: A Sandbox for Portable, Untrusted x86 Native Code, vol.53, pp.1-0782, 2010.

B. Zeng, G. Tan, and G. Morrisett, « Combining Control-flow Integrity and Static Analysis for Efficient and Validated Data Sandboxing, Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11, pp.29-40, 2011.

S. Zhang, M. Vijayaraghavan, and A. , 2017 26th International Conference on Parallel Architectures and Compilation Techniques (PACT), pp.288-302, 2017.

L. Zhao, Proceedings of the Ninth ACM International Conference on Embedded Software, EMSOFT '11, pp.289-298, 2011.

F. Besson, T. Jensen, and J. Lepiller, Modular Software Fault Isolation as Abstract Interpretation », in: Static Analysis, pp.978-981, 2018.