Introduction - If you have any usage issues, please Google them yourself
An assembly language to explore ways to achieve the target, in addition to this paper implements a prototype system and the use of the system of linked list, binary tree, such as non-trivial procedures to guide the automatic verification of security.