Abstract is missing.
- Micro-Policies: Formally Verified, Tag-Based Security MonitorsCatalin Hritcu. 1 [doi]
- Swapsies on the Internet: First Steps towards Reasoning about Risk and Trust in an Open WorldSophia Drossopoulou, James Noble, Mark S. Miller. 2-15 [doi]
- Memory-safe Execution of C on a Java VMMatthias Grimmer, Roland Schatz, Chris Seaton, Thomas Würthinger, Hanspeter Mössenböck. 16-27 [doi]
- Dynamic Enforcement of Dynamic PoliciesPablo Buiras, Bart van Delft. 28-41 [doi]
- Tierless Programming and Reasoning for NetworksShriram Krishnamurthi. 42 [doi]
- Short Paper: On High-Assurance Information-Flow-Secure Programming LanguagesToby C. Murray. 43-48 [doi]
- Short Paper: The Meaning of Attack-Resistant SystemsVijay Ganesh, Sebastian Banescu, Martín Ochoa. 49-55 [doi]