Retaining sandbox containment despite bugs in privileged memory-safe code
Robusta
Security analysis of India’s electronic voting machines
Modeling attacks on physical unclonable functions
TASTY