References

  1. Common Criteria. Available at http://www.commmoncriteria.org/.
  2. Jonathan Bachrach & Keith Playford (2001): The Java Syntactic Extender. In: OOPSLA, pp. 31–42, doi:10.1145/504311.504285.
  3. Walter Binder & Jarle Hulaas (2005): Java Bytecode Transformations for Efficient, Portable CPU Accounting. Electron. Notes Theor. Comput. Sci. 141(1), pp. 53–73, doi:10.1016/j.entcs.2005.02.037.
  4. Lilian Burdy, Marieke Huisman & Mariela Pavlova (2007): Preliminary Design of BML: A Behavioral Interface Specification Language for Java Bytecode. In: FASE, pp. 215–229. Available at http://dx.doi.org/10.1007/978-3-540-71289-3_18.
  5. Lilian Burdy & Mariela Pavlova (2006): Java bytecode specification and verification. In: SAC, pp. 1835–1839, doi:10.1145/1141277.1141708.
  6. Markus Dahm (1999): Byte Code Engineering. In: Java-Informations-Tage, pp. 267–277.
  7. Marcus Denker, Stéphane Ducasse & íric Tanter (2006): Runtime bytecode transformation for Smalltalk. Comput. Lang. Syst. Struct. 32(2-3), pp. 125–139, doi:10.1016/j.cl.2005.10.002.
  8. Edsger W. Dijkstra (1972): Structured programming, chapter Notes on structured programming, pp. 1–82. Academic Press Ltd., London, UK. Available at http://dl.acm.org/citation.cfm?id=1243380.1243381.
  9. Stephen N. Freund & John C. Mitchell (1999): A type system for object initialization in the Java bytecode language. ACM Trans. Program. Lang. Syst. 21(6), pp. 1196–1250. Available at http://doi.acm.org/10.1145/330643.330646.
  10. Stephen N. Freund & John C. Mitchell (2003): A Type System for the Java Bytecode Language and Verifier. J. Autom. Reasoning 30(3-4), pp. 271–321, doi:10.1023/A:1025011624925.
  11. Gerald C. Gannod & Betty H. C. Cheng (1996): Strongest Postcondition Semantics as the Formal Basis for Reverse Engineering. Autom. Softw. Eng. 3(1/2), pp. 139–164. Available at http://dx.doi.org/10.1007/BF00126962.
  12. Benjamin Grégoire & Jorge Luis Sacchini (2008): Combining a verification condition generator for a bytecode language with static analyses. In: Proceedings of the 3rd conference on Trustworthy global computing, TGC'07. Springer-Verlag, Berlin, Heidelberg, pp. 23–40, doi:10.1007/978-3-540-78663-4_4. Available at http://dl.acm.org/citation.cfm?id=1793574.1793580.
  13. C. A. R. Hoare (1969): An Axiomatic Basis for Computer Programming. Commun. ACM 12(10), pp. 576–580, doi:10.1145/363235.363259.
  14. A.C. Noubissi (2011): Mise á jour dynamique et scurisée de composants systéme dans une carte á puce. University of Limoges, France.
  15. Agnes C. Noubissi, Julien Iguchi-Cartigny & Jean-Louis Lanet (2010): Incremental Dynamic Update for Java-Based Smart Cards. 2010 Fifth International Conference on Systems 0, pp. 110–113, doi:10.1109/ICONS.2010.27.
  16. Agnes C. Noubissi, Julien Iguchi-Cartigny & Jean-Louis Lanet (2011): Hot updates for Java based smart cards. In: ICDE Workshops, pp. 168–173. Available at http://dx.doi.org/10.1109/ICDEW.2011.5767630.
  17. Takahiro Sakamoto, Tatsurou Sekiguchi & Akinori Yonezawa (2000): Bytecode Transformation for Portable Thread Migration in Java. In: ASA/MA, pp. 16–28. Available at http://dx.doi.org/10.1007/978-3-540-45347-5_3.
  18. Raymie Stata & Martín Abadi (1999): A Type System for Java Bytecode Subroutines. ACM Trans. Program. Lang. Syst. 21(1), pp. 90–137. Available at http://doi.acm.org/10.1145/314602.314606.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org