T. M. Austin, S. E. Breach, and G. S. Sohi, Efficient detection of all pointer and array access errors, Programming Languages Design and Implementation (PLDI), 1994.

Y. Bertot, B. Grégoire, and X. Leroy, A structured approach to proving compiler optimizations based on dataflow analysis, Types for Proofs and Programs (TYPES), 2006.
URL : https://hal.archives-ouvertes.fr/inria-00289549

S. Blazy and X. Leroy, Mechanized semantics for the Clight subset of the C language, Journal of Automated Reasoning, vol.43, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00352524

D. Cachera, T. P. Jensen, D. Pichardie, and V. Rusu, Extracting a data flow analyser in constructive logic, Theoretical Computer Science, vol.342, 2005.
URL : https://hal.archives-ouvertes.fr/inria-00564633

S. Christey, CWE/SANS top 25 most dangerous software errors, The MITRE Corporation, 2011.

L. A. Clarke and D. S. Rosenblum, A historical perspective on runtime assertion checking in software development, Software Engineering Notes, p.31, 2006.

L. Correnson and J. Signoles, Combining analyses for C program verification, Formal Methods for Industrial Case Studies (FMICS), 2012.
URL : https://hal.archives-ouvertes.fr/cea-01809014

M. Delahaye, N. Kosmatov, and J. Signoles, Common specification language for static and dynamic analysis of C programs, Applied Computing (SAC), 2013.
URL : https://hal.archives-ouvertes.fr/hal-00853721

M. Hofmann, A. Karbyshev, and H. Seidl, Verifying a local generic solver in Coq, Static Analysis (SAS), 2010.

, Programming languages -C. ISO/IEC 9899:1999, 1999.

A. Jakobsson, N. Kosmatov, and J. Signoles, Fast as a shadow, expressive as a tree: optimized memory monitoring for C, Science of Computer Programming, vol.132, 2016.
URL : https://hal.archives-ouvertes.fr/cea-01845194

J. Jourdan, V. Laporte, S. Blazy, X. Leroy, and D. Pichardie, A formally-verified C static analyzer, Principles of Programming Languages (POPL), 2015.
URL : https://hal.archives-ouvertes.fr/hal-01078386

G. A. Kildall, A unified approach to global program optimization, Principles of Programming Languages (POPL, 1973.

F. Kirchner, N. Kosmatov, V. Prevosto, J. Signoles, and B. Yakobowski, Frama-C: A software analysis perspective, Formal Aspects of Computing, vol.27, 2015.
URL : https://hal.archives-ouvertes.fr/cea-01808981

N. Kosmatov, G. Petiot, and J. Signoles, An optimized memory monitoring for runtime assertion checking of C programs, Runtime Verification (RV), 2013.
URL : https://hal.archives-ouvertes.fr/cea-01834990

X. Leroy, A. W. Appel, S. Blazy, and G. Stewart, The CompCert memory model, Program Logics for Certified Compilers, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00905435

M. Mehlich, CheckPointer -a C memory access validator, Source Code Analysis and Manipulation (SCAM), 2011.

G. C. Necula, J. Condit, M. Harren, S. Mcpeak, and W. Weimer, CCured: Type-safe retrofitting of legacy software. Programming Languages and Systems (TOPLAS), vol.27, 2005.

F. Nielson, R. Hanne, C. Nielson, and . Hankin, Principles of Program Analysis, 1999.

Y. Oiwa, Implementation of the memory-safe full ANSI-C compiler, Programming Language Design and Implementation (PLDI, 2009.

G. Petiot, N. Kosmatov, B. Botella, A. Giorgetti, and J. Julliand, Your proof fails? Testing helps to find the reason, Tests and Proofs (TAP), 2016.
URL : https://hal.archives-ouvertes.fr/cea-01808892

K. Serebryany, D. Bruening, A. Potapenko, and D. Vyukov, AddressSanitizer: a fast address sanity checker, USENIX Annual Technical Conference (USENIX). USENIX Association, 2012.

J. Signoles, N. Kosmatov, and K. Vorobyov, E-ACSL, a runtime verification tool for safety and security of C programs. tool paper, Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools (RV-CuBES). EasyChair, 2017.

S. Matthew, R. Simpson, and . Barua, MemSafe: ensuring the spatial and temporal memory safety of C at runtime. Software: Practice and Experience, vol.43, 2013.

D. Song, J. Lettner, P. Rajasekaran, Y. Na, S. Volckaert et al., SoK: sanitizing for security, Security and Privacy (S&P), 2019.

M. Sullivan and R. Chillarege, Software defects and their impact on system availability: a study of field failures in operating systems, Fault Tolerant Computing (FTCS), 1991.

N. Victor-van-der-veen, L. Dutt-sharma, H. Cavallaro, and . Bos, Memory errors: the past, the present, and the future, Research in Attacks, Intrusions, and Defenses (RAID), 2012.

K. Vorobyov, J. Signoles, and N. Kosmatov, Shadow state encoding for efficient monitoring of block-level properties, Memory Management (ISMM), 2017.
URL : https://hal.archives-ouvertes.fr/cea-01836510

K. Vorobyov, N. Kosmatov, and J. Signoles, Detection of security vulnerabilities in C code using runtime verification: an experience report, Tests and Proofs (TAP), 2018.

J. Yuan and R. Johnson, CAWDOR: compiler assisted worm defense, Source Code Analysis and Manipulation (SCAM), 2012.