{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:42:48Z","timestamp":1725486168734},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540426103"},{"type":"electronic","value":"9783540454182"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45418-7_5","type":"book-chapter","created":{"date-parts":[[2007,6,3]],"date-time":"2007-06-03T21:08:09Z","timestamp":1180904889000},"page":"43-57","source":"Crossref","is-referenced-by-count":3,"title":["Context Inference for Static Analysis of Java Card Object Sharing"],"prefix":"10.1007","author":[{"given":"Denis","family":"Caromel","sequence":"first","affiliation":[]},{"given":"Ludovic","family":"Henrio","sequence":"additional","affiliation":[]},{"given":"Bernard","family":"Serpette","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,9,11]]},"reference":[{"key":"5_CR1","unstructured":"Zhiqun Chen. How to write a java card applet: A developer\u2019s guide. http:\/\/www.javaworld.com\/javaworld\/jw-07-1999\/jw-07-javacardp.html ."},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"A. Deutsch. Interprocedural may-alias analysis for pointers: Beyond k-limiting. In SIGPLAN\u201994 Conf. on Programming Language Design and Implementation, pages 230\u2013241, Orlando (Florida, USA), June 1994. ACM. SIGPLAN Notices, 29(6).","DOI":"10.1145\/773473.178263"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Alain Deutsch. A storeless model of aliasing and its abstractions using finite representations of right-regular equivalence relations. In Proceedings of the IEEE 1992 International Conference on Computer Languages, pages 2\u201313, San Francisco, April 1992. IEEE Press.","DOI":"10.1109\/ICCL.1992.185463"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Alain Deutsch. Semantic models and abstract interpretation techniques for inductive data structures and pointers. In Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation, pages 226\u2013229, La Jolla, California, June 21\u201323, 1995.","DOI":"10.1145\/215465.215594"},{"key":"5_CR5","unstructured":"Anup K. Ghosh. Security risks of java cards. In Proceedings of the Twelfth IFIP WG 11.3 Working Conference on Database Security, Greece, 1999."},{"key":"5_CR6","unstructured":"Pierre Girard. Which security policy for multiapplication smart cards. In Proceedings of the USENIX Workshop on Smartcard Technology (SMARTCARD-99), pages 21\u201328, Berkeley, CA, May 10\u201311 1999. USENIX Association."},{"key":"5_CR7","unstructured":"Nevin Heintze. Set constraints in program analysis. Technical report, Carnegie-Mellon University, July 1993."},{"key":"5_CR8","unstructured":"Michael Montgomery and Ksheerabdhi Krishna. Secure object sharing in java card. In Proceedings of the USENIX Workshop on Smartcard Technology (SMARTCARD-99), pages 119\u2013128, Berkeley, CA, May 10\u201311 1999. USENIX Association."},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Erik Poll, Joachim van den Berg, and Bart Jacobs. Specification of the JavaCard API in JML. In Fourth Smart Card Research and Advanced Application Conference (IFIP Cardis). Kluwer Academic Publishers, 2000.","DOI":"10.1007\/978-0-387-35528-3_8"},{"key":"5_CR10","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1007\/3-540-59293-8_226","volume":"915","author":"M. Sagiv","year":"1995","unstructured":"M. Sagiv, T. Reps, and S. Horwitz. Precise interprocedural dataflow analysis with applications to constant propagation. Lecture Notes in Computer Science, 915:651\u2013--, 1995.","journal-title":"Lecture Notes in Computer Science"},{"key":"5_CR11","volume-title":"Technical Report CS-TR-1998-1383","author":"M. Sagiv","year":"1998","unstructured":"Mooly Sagiv, Thomas Reps, and Reinhard Wilhelm. Parametric shape analysis via 3-valued logic. Technical Report CS-TR-1998-1383, University of Wisconsin, Madison, August 1998."},{"key":"5_CR12","unstructured":"M. Sharir and A. Pnueli. Two approaches to interprocedural data flow analysis. 1981."},{"key":"5_CR13","unstructured":"SUN microsystems. Java card 2.1 platform api specification. http:\/\/java.sun.com\/products\/javacard\/htmldoc\/index.html ."},{"key":"5_CR14","unstructured":"SUN microsystems. Java card 2.1 runtime environment (jcre) specification. http:\/\/java.sun.com\/products\/javacard\/JCRESpec.pdf ."},{"key":"5_CR15","unstructured":"SUN microsystems. Java card 2.1 virtual machine specification. http:\/\/java.sun.com\/products\/javacard\/javacard21.html ."},{"key":"5_CR16","unstructured":"SUN microsystems. Java card applet developper\u2019s guide. http:\/\/java.sun.com\/products\/javacard\/AppletDevelopersGuide.html ."},{"key":"5_CR17","unstructured":"Robert Tolksdorf. Programming languages for the java virtual machine. http:\/\/grunge.cs.tu-berlin.de\/ tolk\/vmlanguages.html ."}],"container-title":["Lecture Notes in Computer Science","Smart Card Programming and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45418-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T16:57:55Z","timestamp":1556470675000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45418-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540426103","9783540454182"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-45418-7_5","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}