{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:59:12Z","timestamp":1764784752534,"version":"3.40.3"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030891589"},{"type":"electronic","value":"9783030891596"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-89159-6_17","type":"book-chapter","created":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T17:57:10Z","timestamp":1633975030000},"page":"253-273","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Slang: The Sireum Programming Language"],"prefix":"10.1007","author":[{"family":"Robby","sequence":"first","affiliation":[]},{"given":"John","family":"Hatcliff","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,12]]},"reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/978-3-642-28641-4_20","volume-title":"Principles of Security and Trust","author":"T Amtoft","year":"2012","unstructured":"Amtoft, T., et al.: A certificate infrastructure for machine-checked proofs of conditional information flow. In: Degano, P., Guttman, J.D. (eds.) POST 2012. LNCS, vol. 7215, pp. 369\u2013389. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28641-4_20"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Amtoft, T., Hatcliff, J., Rodr\u00edguez, E., Robby, Hoag, J., Greve, D.A.: Specification and checking of software contracts for conditional information flow. In: Hardin, D.S. (ed.) Design and Verification of Microprocessor Systems for High-Assurance Applications, pp. 341\u2013379. Springer, Cham (2010)","DOI":"10.1007\/978-1-4419-1539-9_12"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Backes, J., et al.: Semantic-based automated reasoning for AWS access policies using SMT. In: Formal Methods in Computer Aided Design (FMCAD), pp. 1\u20139 (2018)","DOI":"10.23919\/FMCAD.2018.8602994"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Banerjee, A., Danvy, O., Doh, K., Hatcliff, J. (eds.): Semantics, Abstract Interpretation, and Reasoning about Programs: Essays Dedicated to David A. Schmidt [on occasion of his 60th birthday], EPTCS, vol. 129. OPA, September 2013","DOI":"10.4204\/EPTCS.129.0"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-540-30569-9_3","volume-title":"Construction and Analysis of Safe, Secure, and Interoperable Smart Devices","author":"M Barnett","year":"2005","unstructured":"Barnett, M., Leino, K.R.M., Schulte, W.: The Spec# programming system: an overview. In: Barthe, G., Burdy, L., Huisman, M., Lanet, J.-L., Muntean, T. (eds.) CASSIS 2004. LNCS, vol. 3362, pp. 49\u201369. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-30569-9_3"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-22110-1_14","volume-title":"Computer Aided Verification","author":"C Barrett","year":"2011","unstructured":"Barrett, C., et al.: CVC4. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 171\u2013177. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22110-1_14"},{"key":"17_CR7","doi-asserted-by":"publisher","unstructured":"Belt, J., Hatcliff, J., Robby, Chalin, P., Hardin, D., Deng, X.: Bakar Kiasan: flexible contract checking for critical systems using symbolic execution. In: Bobaru, M., Havelund, K., Holzmann, G.J., Joshi, R. (eds.) NASA Formal Methods. NFM 2011. LNCS, vol. 6617, pp. 58\u201372. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20398-5_6","DOI":"10.1007\/978-3-642-20398-5_6"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Belt, J., Robby, Deng, X.: Sireum\/Topi LDP: a lightweight semi-decision procedure for optimizing symbolic execution-based analyses. In: 7th joint European Software Engineering Conference and ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEC\/FSE), pp. 355\u2013364 (2009)","DOI":"10.1145\/1595696.1595762"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Blanc, R., Kuncak, V., Kneuss, E., Suter, P.: An overview of the Leon verification system: verification by translation to recursive functions. In: 4th Workshop on Scala, pp. 1:1\u20131:10 (2013)","DOI":"10.1145\/2489837.2489838"},{"issue":"1\u20134","key":"17_CR10","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/s10817-018-9457-5","volume":"61","author":"Q Cao","year":"2018","unstructured":"Cao, Q., Beringer, L., Gruetter, S., Dodds, J., Appel, A.W.: VST-Floyd: a separation logic tool to verify correctness of C programs. J. Autom. Reason. 61(1\u20134), 367\u2013422 (2018)","journal-title":"J. Autom. Reason."},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Chalin, P., Robby, James, P.R., Lee, J., Karabotsos, G.: Towards an industrial grade IVE for Java and next generation research platform for JML. Int. J. Softw. Tools Technol. Transf. (STTT) 12(6), 429\u2013446 (2010)","DOI":"10.1007\/s10009-010-0164-8"},{"key":"17_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-642-36946-9_3","volume-title":"Aliasing in Object-Oriented Programming. Types, Analysis and Verification","author":"D Clarke","year":"2013","unstructured":"Clarke, D., \u00d6stlund, J., Sergey, I., Wrigstad, T.: Ownership types: a survey. In: Clarke, D., Noble, J., Wrigstad, T. (eds.) Aliasing in Object-Oriented Programming. Types, Analysis and Verification. LNCS, vol. 7850, pp. 15\u201358. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36946-9_3"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Corbett, J.C., et al.: Bandera: extracting finite-state models from Java source code. In: 22nd International Conference on Software Engineering (ICSE), pp. 439\u2013448 (2000)","DOI":"10.1145\/337180.337234"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Corbett, J.C., Dwyer, M.B., Hatcliff, J., Robby: Expressing checkable properties of dynamic systems: the Bandera Specification Language. Int. J. Softw. Tools Technol. Transf. (STTT) 4(1), 34\u201356 (2002)","DOI":"10.1007\/s100090200075"},{"key":"17_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-642-33826-7_16","volume-title":"Software Engineering and Formal Methods","author":"P Cuoq","year":"2012","unstructured":"Cuoq, P., Kirchner, F., Kosmatov, N., Prevosto, V., Signoles, J., Yakobowski, B.: Frama-C - a software analysis perspective. In: Eleftherakis, G., Hinchey, M., Holcombe, M. (eds.) SEFM 2012. LNCS, vol. 7504, pp. 233\u2013247. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33826-7_16"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Deng, X., Dwyer, M.B., Hatcliff, J., Jung, G., Robby, Singh, G.: Model-checking middleware-based event-driven real-time embedded software. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.P. (eds.) 1st International Symposium Formal Methods for Components and Objects (FMCO). LNCS, vol. 2852, pp. 154\u2013181. Springer, Heidelberg (2002)","DOI":"10.1007\/978-3-540-39656-7_6"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Deng, X., Lee, J., Robby: Efficient and formal generalized symbolic execution. Autom. Softw. Eng. (ASE) 19(3), 233\u2013301 (2012)","DOI":"10.1007\/s10515-011-0089-9"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Hatcliff, J., Belt, J., Robby, Carpenter, T.: HAMR: an AADL multi-platform code generation toolset. In: Margaria, T., Steffen, B. (eds.) ISoLA 2021. LNCS, vol. 13036, pp. 274\u2013295. Springer, Cham (2021)","DOI":"10.1007\/978-3-030-89159-6_18"},{"key":"17_CR19","doi-asserted-by":"publisher","unstructured":"Hatcliff, J., Dwyer, M.B., Pasareanu, C.S., Robby: Foundations of the Bandera abstraction tools. In: Mogensen, T.E., Schmidt, D.A., Sudborough, I.H. (eds.) The Essence of Computation. LNCS, vol. 2566, pp. 172\u2013203. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-36377-7_9","DOI":"10.1007\/3-540-36377-7_9"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Hatcliff, J., Robby, Chalin, P., Belt, J.: Explicating symbolic execution (xSymExe): an evidence-based verification framework. In: 35th International Conference on Software Engineering (ICSE), pp. 222\u2013231 (2013)","DOI":"10.1109\/ICSE.2013.6606568"},{"key":"17_CR21","unstructured":"International, S.: SAE AS5506 Rev. C Architecture Analysis and Design Language (AADL). SAE International (2017)"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Klein, G., et al.: seL4: formal verification of an OS kernel. In: 22nd ACM Symposium on Operating Systems Principles (SOSP), pp. 207\u2013220 (2009)","DOI":"10.1145\/1629575.1629596"},{"key":"17_CR23","doi-asserted-by":"publisher","unstructured":"Leavens, G.T., Baker, A.L., Ruby, C.: JML: a notation for detailed design. In: Kilov, H., Rumpe, B., Simmonds, I. (eds.) Behavioral Specifications of Businesses and Systems. The Springer International Series in Engineering and Computer Science, vol. 523. Springer, Boston (1999). https:\/\/doi.org\/10.1007\/978-1-4615-5229-1_12","DOI":"10.1007\/978-1-4615-5229-1_12"},{"key":"17_CR24","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/978-3-642-17511-4_20","volume-title":"Logic for Programming, Artificial Intelligence, and Reasoning","author":"KRM Leino","year":"2010","unstructured":"Leino, K.R.M.: Dafny: an automatic program verifier for functional correctness. In: Clarke, E.M., Voronkov, A. (eds.) LPAR 2010. LNCS (LNAI), vol. 6355, pp. 348\u2013370. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17511-4_20"},{"key":"17_CR25","unstructured":"Leroy, X., Blazy, S., K\u00e4stner, D., Schommer, B., Pister, M., Ferdinand, C.: CompCert - a formally verified optimizing compiler. In: Embedded Real Time Software and Systems (ERTS) (2016)"},{"key":"17_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-540-78800-3_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"L de Moura","year":"2008","unstructured":"de Moura, L., Bj\u00f8rner, N.: Z3: an efficient SMT solver. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 337\u2013340. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78800-3_24"},{"key":"17_CR27","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/978-3-319-21401-6_26","volume-title":"Automated Deduction - CADE-25","author":"L de Moura","year":"2015","unstructured":"de Moura, L., Kong, S., Avigad, J., van Doorn, F., von Raumer, J.: The lean theorem prover (system description). In: Felty, A.P., Middeldorp, A. (eds.) CADE 2015. LNCS (LNAI), vol. 9195, pp. 378\u2013388. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21401-6_26"},{"issue":"3","key":"17_CR28","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.tcs.2007.02.004","volume":"376","author":"DA Naumann","year":"2007","unstructured":"Naumann, D.A.: Observational purity and encapsulation. Theor. Comput. Sci. (TCS) 376(3), 205\u2013224 (2007)","journal-title":"Theor. Comput. Sci. (TCS)"},{"key":"17_CR29","doi-asserted-by":"crossref","unstructured":"Robby, Chalin, P.: Preliminary design of a unified JML representation and software infrastructure. In: 11th Formal Techniques for Java-like Programs (FTfJP), pp. 5:1\u20135:7 (2009)","DOI":"10.1145\/1557898.1557903"},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Robby, Dwyer, M.B., Hatcliff, J.: Bogor: an extensible and highly-modular software model checking framework. In: 11th ACM SIGSOFT Symposium on Foundations of Software Engineering held Jointly with 9th European Software Engineering Conference (ESEC\/FSE), pp. 267\u2013276 (2003)","DOI":"10.1145\/949952.940107"},{"key":"17_CR31","doi-asserted-by":"publisher","unstructured":"Rodr\u00edguez, E., Dwyer, M., Flanagan, C., Hatcliff, J., Leavens, G.T., Robby: Extending JML for modular specification and verification of multi-threaded programs. In: Black, A.P. (eds.) ECOOP 2005 - Object-Oriented Programming. ECOOP 2005. LNCS, vol. 3586, pp. 551\u2013576. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11531142_24","DOI":"10.1007\/11531142_24"},{"key":"17_CR32","doi-asserted-by":"crossref","unstructured":"Thiagarajan, H., Hatcliff, J., Belt, J., Robby: Bakar Alir: supporting developers in construction of information flow contracts in SPARK. In: 12th Source Code Analysis and Manipulation (SCAM), pp. 132\u2013137 (2012)","DOI":"10.1109\/SCAM.2012.25"},{"key":"17_CR33","doi-asserted-by":"publisher","unstructured":"Thiagarajan, H., Hatcliff, J., Robby: Awas: AADL information flow and error propagation analysis framework. Innovations Syst. Softw. Eng. (ISSE) (2021). https:\/\/doi.org\/10.1007\/s11334-021-00410-w","DOI":"10.1007\/s11334-021-00410-w"},{"key":"17_CR34","doi-asserted-by":"crossref","unstructured":"Wei, F., Roy, S., Ou, X., Robby: Amandroid: a precise and general inter-component data flow analysis framework for security vetting of Android apps. ACM Trans. Priv. Secur. (TOPS) 21(3), 14:1\u201314:32 (2018)","DOI":"10.1145\/3183575"},{"key":"17_CR35","doi-asserted-by":"publisher","unstructured":"Wilding, M.M., Greve, D.A., Richards, R.J., Hardin, D.S.: Formal verification of partition management for the AAMP7G microprocessor. In: Hardin, D. (eds.) Design and Verification of Microprocessor Systems for High-Assurance Applications. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-1-4419-1539-9_6","DOI":"10.1007\/978-1-4419-1539-9_6"},{"key":"17_CR36","doi-asserted-by":"crossref","unstructured":"Yi, J., Robby, Deng, X., Roychoudhury, A.: Past expression: encapsulating pre-states at post-conditions by means of AOP. In: Aspect-Oriented Software Development (AOSD), pp. 133\u2013144 (2013)","DOI":"10.1145\/2451436.2451453"},{"key":"17_CR37","doi-asserted-by":"publisher","unstructured":"Zhang, Z., Robby, Hatcliff, J., Moy, Y., Courtieu, P.: Focused certification of an industrial compilation and static verification toolchain. In: Cimatti, A., Sirjani, M. (eds.) Software Engineering and Formal Methods. SEFM 2017. LNCS, vol. 10469, pp. 17\u201334. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66197-1_2","DOI":"10.1007\/978-3-319-66197-1_2"},{"key":"17_CR38","unstructured":"Project Loom. https:\/\/openjdk.java.net\/projects\/loom"},{"key":"17_CR39","unstructured":"Sireum Logika: A program verifier and a natural deduction proof checker for propositional, predicate, and programming logics. http:\/\/logika.v3.sireum.org"},{"key":"17_CR40","unstructured":"Slang: The Sireum Programming Language. http:\/\/slang.sireum.org"}],"container-title":["Lecture Notes in Computer Science","Leveraging Applications of Formal Methods, Verification and Validation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-89159-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T08:07:00Z","timestamp":1648195620000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-89159-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030891589","9783030891596"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-89159-6_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"12 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISoLA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Leveraging Applications of Formal Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rhodes","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isola2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isola-conference.org\/isola2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}