{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:38:42Z","timestamp":1742985522476,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031826993"},{"type":"electronic","value":"9783031827006"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-82700-6_8","type":"book-chapter","created":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T10:48:08Z","timestamp":1737715688000},"page":"163-183","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Two-Way Collaboration Between Flow and\u00a0Proof in\u00a0SPARK"],"prefix":"10.1007","author":[{"given":"Claire","family":"Dross","sequence":"first","affiliation":[]},{"given":"Joffrey","family":"Huguet","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Kanig","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,24]]},"reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-319-73721-8_2","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"J Bader","year":"2018","unstructured":"Bader, J., Aldrich, J., Tanter, \u00c9.: Gradual program verification. In: VMCAI 2018. LNCS, vol. 10747, pp. 25\u201346. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-73721-8_2"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-319-61467-0_2","volume-title":"Tests and Proofs","author":"G Barany","year":"2017","unstructured":"Barany, G., Signoles, J.: Hybrid information flow analysis for real-world C code. In: Gabmeyer, S., Johnsen, E.B. (eds.) TAP 2017. LNCS, vol. 10375, pp. 23\u201340. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-61467-0_2"},{"issue":"8","key":"8_CR3","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/3470569","volume":"64","author":"P Baudin","year":"2021","unstructured":"Baudin, P., et al.: The dogged pursuit of bug-free C programs: the Frama-C software analysis platform. Commun. ACM 64(8), 56\u201368 (2021)","journal-title":"Commun. ACM"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-319-92994-1_3","volume-title":"Tests and Proofs","author":"L Blatter","year":"2018","unstructured":"Blatter, L., Kosmatov, N., Le Gall, P., Prevosto, V., Petiot, G.: Static and dynamic verification of relational properties on self-composed C code. In: Dubois, C., Wolff, B. (eds.) TAP 2018. LNCS, vol. 10889, pp. 44\u201362. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-92994-1_3"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/978-3-319-98938-9_3","volume-title":"Integrated Formal Methods","author":"J Boerman","year":"2018","unstructured":"Boerman, J., Huisman, M., Joosten, S.: Reasoning about JML: differences between KeY and OpenJML. In: Furia, C.A., Winter, K. (eds.) IFM 2018. LNCS, vol. 11023, pp. 30\u201346. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98938-9_3"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-030-11245-5_8","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"Q Bouillaguet","year":"2019","unstructured":"Bouillaguet, Q., Bobot, F., Sighireanu, M., Yakobowski, B.: Exploiting pointer analysis in memory models for deductive verification. In: Enea, C., Piskac, R. (eds.) VMCAI 2019. LNCS, vol. 11388, pp. 160\u2013182. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-11245-5_8"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Burdy, L., et al.: An overview of JML tools and applications. Int. J. Softw. Tools Technol. Transf. 7, 212\u2013232 (2005)","DOI":"10.1007\/s10009-004-0167-4"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/11804192_16","volume-title":"Formal Methods for Components and Objects","author":"P Chalin","year":"2006","unstructured":"Chalin, P., Kiniry, J.R., Leavens, G.T., Poll, E.: Beyond assertions: advanced specification and verification with JML and ESC\/Java2. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2005. LNCS, vol. 4111, pp. 342\u2013363. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11804192_16"},{"issue":"3","key":"8_CR9","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3624728","volume":"67","author":"R Chapman","year":"2024","unstructured":"Chapman, R., Dross, C., Matthews, S., Moy, Y.: Co-developing programs and their proof of correctness. Commun. ACM 67(3), 84\u201394 (2024)","journal-title":"Commun. ACM"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-642-32469-7_8","volume-title":"Formal Methods for Industrial Critical Systems","author":"L Correnson","year":"2012","unstructured":"Correnson, L., Signoles, J.: Combining analyses for C program verification. In: Stoelinga, M., Pinger, R. (eds.) FMICS 2012. LNCS, vol. 7437, pp. 108\u2013130. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32469-7_8"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-030-53291-8_11","volume-title":"Computer Aided Verification","author":"C Dross","year":"2020","unstructured":"Dross, C., Kanig, J.: Recursive data structures in SPARK. In: Lahiri, S.K., Wang, C. (eds.) CAV 2020. LNCS, vol. 12225, pp. 178\u2013189. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-53291-8_11"},{"issue":"1\u20133","key":"8_CR12","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.scico.2007.01.015","volume":"69","author":"MD Ernst","year":"2007","unstructured":"Ernst, M.D., et al.: The Daikon system for dynamic detection of likely invariants. Sci. Comput. Program. 69(1\u20133), 35\u201345 (2007)","journal-title":"Sci. Comput. Program."},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/978-3-642-18070-5_2","volume-title":"Formal Verification of Object-Oriented Software","author":"M F\u00e4hndrich","year":"2011","unstructured":"F\u00e4hndrich, M., Logozzo, F.: Static contract checking with abstract interpretation. In: Beckert, B., March\u00e9, C. (eds.) FoVeOOS 2010. LNCS, vol. 6528, pp. 10\u201330. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-18070-5_2"},{"issue":"3","key":"8_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2506375","volume":"46","author":"CA Furia","year":"2014","unstructured":"Furia, C.A., Meyer, B., Velder, S.: Loop invariants: analysis, classification, and examples. ACM Comput. Surv. 46(3), 1\u201351 (2014)","journal-title":"ACM Comput. Surv."},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Hatcliff, J., Leavens, G.T., Leino, K.R.M., M\u00fcller, P., Parkinson, M.: Behavioral interface specification languages. ACM Comput. Surv. 44(3) (2012)","DOI":"10.1145\/2187671.2187678"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Kosmatov, N., March\u00e9, C., Moy, Y., Signoles, J.: Static versus dynamic verification in Why3, Frama-C and SPARK 2014. In: 7th International Symposium on Leveraging Applications, p.\u00a016. Springer, Corfu (2016). https:\/\/hal.inria.fr\/hal-01344110","DOI":"10.1007\/978-3-319-47166-2_32"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"McCormick, J.W., Chapin, P.C.: Building High Integrity Applications with SPARK. Cambridge University Press, Cambridge (2015)","DOI":"10.1017\/CBO9781139629294"},{"key":"8_CR18","volume-title":"Object-Oriented Software Construction","author":"B Meyer","year":"2000","unstructured":"Meyer, B.: Object-Oriented Software Construction, 2nd edn. Pearson College Div, Boston (2000)","edition":"2"}],"container-title":["Lecture Notes in Computer Science","Verification, Model Checking, and Abstract Interpretation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-82700-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T10:48:13Z","timestamp":1737715693000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-82700-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031826993","9783031827006"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-82700-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"24 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"VMCAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Verification, Model Checking, and Abstract Interpretation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denver, CO","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 January 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 January 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"vmcai2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.researchr.org\/home\/VMCAI-2025","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}