{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:21:34Z","timestamp":1725560494960},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540213055"},{"type":"electronic","value":"9783540247210"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24721-0_7","type":"book-chapter","created":{"date-parts":[[2010,7,27]],"date-time":"2010-07-27T20:15:12Z","timestamp":1280261712000},"page":"99-113","source":"Crossref","is-referenced-by-count":7,"title":["A Tool-Assisted Framework for\u00a0Certified\u00a0Bytecode\u00a0Verification"],"prefix":"10.1007","author":[{"given":"Gilles","family":"Barthe","sequence":"first","affiliation":[]},{"given":"Guillaume","family":"Dufay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Roadmap for European Research on Smartcard Technologies. See, \n                    \n                      http:\/\/www.ercim.org\/reset"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/10930755_22","volume-title":"Theorem Proving in Higher Order Logics","author":"J. Andronick","year":"2003","unstructured":"Andronick, J., Chetali, B., Ly, O.: Using Coq to Verify Java Card Applet Isolation Properties. In: Basin, D., Wolff, B. (eds.) TPHOLs 2003. LNCS, vol.\u00a02758, pp. 335\u2013351. Springer, Heidelberg (2003)"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-45719-4_4","volume-title":"Algebraic Methodology and Software Technology","author":"G. Barthe","year":"2002","unstructured":"Barthe, G., Courtieu, P., Dufay, G., Melo de Sousa, S.: Tool-Assisted Specification and Verification of the JavaCard Platform. In: Kirchner, H., Ringeissen, C. (eds.) AMAST 2002. LNCS, vol.\u00a02422, pp. 41\u201359. Springer, Heidelberg (2002)"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/3-540-45309-1_20","volume-title":"Programming Languages and Systems","author":"G. Barthe","year":"2001","unstructured":"Barthe, G., Dufay, G., Jakubiec, L., Serpette, B., Melo de Sousa, S.: A Formal Executable Semantics of the JavaCard Platform. In: Sands, D. (ed.) ESOP 2001. LNCS, vol.\u00a02028, pp. 302\u2013319. Springer, Heidelberg (2001)"},{"key":"7_CR5","unstructured":"Betarte, G., Chetali, B., Gim\u00e9nez, E., Loiseaux, C., Ly, O.: Formal Modeling and Verification of the Java Card Security Architecture: from Static Checkings to Embedded Applet Execution. In: Proceedings of ESMART 2002 (2002)"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/10930755_18","volume-title":"Theorem Proving in Higher Order Logics","author":"J. Chrzaszcz","year":"2003","unstructured":"Chrzaszcz, J.: Implementing Modules in the Coq System. In: Basin, D., Wolff, B. (eds.) TPHOLs 2003. LNCS, vol.\u00a02758, pp. 270\u2013286. Springer, Heidelberg (2003)"},{"key":"7_CR7","unstructured":"Coglio, A.: Simple Verification Technique for Complex Java Bytecode Subroutines. In: Proceedings of FTFJP 2002 (2002)"},{"key":"7_CR8","unstructured":"Coq Development Team. The Coq Proof Assistant User\u2019s Guide. Version 7.4 (February 2003)"},{"issue":"3-4","key":"7_CR9","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1023\/A:1025011624925","volume":"30","author":"S.N. Freund","year":"2003","unstructured":"Freund, S.N., Mitchell, J.C.: A Type System for the Java Bytecode Language and Verifier. Journal of Automated Reasoning\u00a030(3-4), 271\u2013321 (2003)","journal-title":"Journal of Automated Reasoning"},{"key":"7_CR10","first-page":"248","volume-title":"Proceedings of POPL 2001","author":"A.D. Gordon","year":"2001","unstructured":"Gordon, A.D., Syme, D.: Typing a multi-language intermediate code. In: Proceedings of POPL 2001, pp. 248\u2013260. ACM Press, New York (2001)"},{"issue":"4","key":"7_CR11","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1145\/503112.503115","volume":"33","author":"P. Hartel","year":"2001","unstructured":"Hartel, P., Moreau, L.: Formalizing the Safety of Java, the Java Virtual Machine and Java Card. ACM Computing Surveys\u00a033(4), 517\u2013558 (2001)","journal-title":"ACM Computing Surveys"},{"key":"7_CR12","unstructured":"Henrio, L., Serpette, B.: A parameterized polyvariant bytecode verifier. In: Filliatre, J.-C. (ed.) Proceedings of JFLA 2003 (2003)"},{"key":"7_CR13","first-page":"194","volume-title":"Proceedings of POPL 1973","author":"G.A. Kildall","year":"1973","unstructured":"Kildall, G.A.: A unified approach to global program optimization. In: Proceedings of POPL 1973, pp. 194\u2013206. ACM Press, New York (1973)"},{"issue":"3","key":"7_CR14","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/S0304-3975(02)00869-1","volume":"298","author":"G. Klein","year":"2002","unstructured":"Klein, G., Nipkow, T.: Verified bytecode verifiers. Theoretical Computer Science\u00a0298(3), 583\u2013626 (2002)","journal-title":"Theoretical Computer Science"},{"issue":"3-4","key":"7_CR15","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1023\/A:1025095122199","volume":"30","author":"G. Klein","year":"2003","unstructured":"Klein, G., Wildmoser, M.: Verified bytecode subroutines. Journal of Automated Reasoning\u00a030(3-4), 363\u2013398 (2003)","journal-title":"Journal of Automated Reasoning"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/10721064_7","volume-title":"Smart Card. Research and Applications","author":"J.-L. Lanet","year":"2000","unstructured":"Lanet, J.-L., Requet, A.: Formal Proof of Smart Card Applets Correctness. In: Quisquater, J.-J., Schneier, B. (eds.) CARDIS 1998. LNCS, vol.\u00a01820, pp. 85\u201397. Springer, Heidelberg (2000)"},{"issue":"3-4","key":"7_CR17","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1023\/A:1025055424017","volume":"30","author":"X. Leroy","year":"2003","unstructured":"Leroy, X.: Java bytecode verification: algorithms and formalizations. Journal of Automated Reasoning\u00a030(3-4), 235\u2013269 (2003)","journal-title":"Journal of Automated Reasoning"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45949-9","volume-title":"Isabelle\/HOL: A Proof Assistant for Higher-Order Logic","author":"T. Nipkow","year":"2002","unstructured":"Nipkow, T., Paulson, L.C., Wenzel, M.: Isabelle\/HOL: A Proof Assistant for Higher-Order Logic. LNCS, vol.\u00a02283. Springer, Heidelberg (2002)"},{"key":"7_CR19","unstructured":"Rose, E., Rose, K.H.: Lightweight bytecode verification. In: Workshop Formal Underpinnings of the Java Paradigm, OOPSLA 1998 (October 1998)"},{"key":"7_CR20","unstructured":"Shankar, N., Owre, S., Rushby, J.M.: The PVS Proof Checker: A Reference Manual. Computer Science Laboratory, SRI International (February 1993). Supplemented with the PVS2 Quick Reference Manual (1997)"},{"key":"7_CR21","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1007\/3-540-36078-6_28","volume-title":"Logic for Programming, Artificial Intelligence, and Reasoning","author":"D. Syme","year":"2002","unstructured":"Syme, D., Gordon, A.D.: Automating type soundness proofs via decision procedures and guided reductions. In: Baaz, M., Voronkov, A. (eds.) LPAR 2002. LNCS (LNAI), vol.\u00a02514, pp. 418\u2013434. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24721-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T08:36:56Z","timestamp":1552811816000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24721-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540213055","9783540247210"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24721-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}