{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T22:31:02Z","timestamp":1769725862255,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540689782","type":"print"},{"value":"9783540689799","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-68979-9_10","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T12:02:26Z","timestamp":1218542546000},"page":"133-142","source":"Crossref","is-referenced-by-count":5,"title":["Slicing for Security of Code"],"prefix":"10.1007","author":[{"given":"Benjamin","family":"Monate","sequence":"first","affiliation":[]},{"given":"Julien","family":"Signoles","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1314466.1314467","volume-title":"CSAW 2007: Proceedings of the 2007 ACM workshop on Computer security architecture","author":"D.J. Bernstein","year":"2007","unstructured":"Bernstein, D.J.: Some thoughts on security after ten years of qmail 1.0. In: CSAW 2007: Proceedings of the 2007 ACM workshop on Computer security architecture, pp. 1\u201310. ACM, New York (2007)"},{"key":"10_CR2","unstructured":"CEA-LIST and INRIA-Futurs. Frama-C: Framework for Modular Analysis of C, http:\/\/www.frama-c.cea.fr"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1145\/512950.512973","volume-title":"Proceedings of the 4th Symposium on Principles of Programming Languages","author":"P. Cousot","year":"1977","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: Proceedings of the 4th Symposium on Principles of Programming Languages, Los Angeles, Californie, \u00c9tats-Unis, pp. 238\u2013252. ACM Press, New York (1977)"},{"issue":"3","key":"10_CR4","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1145\/24039.24041","volume":"9","author":"J. Ferrante","year":"1987","unstructured":"Ferrante, J., Ottenstein, K.J., Warren, J.D.: The program dependence graph and its use in optimization. ACM Trans. Program. Lang. Syst.\u00a09(3), 319\u2013349 (1987)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"10_CR5","volume-title":"Foundations of Computing","author":"C.A. Gunter","year":"1992","unstructured":"Gunter, C.A.: Semantics of Programming Languages: Structures and Techniques. In: Foundations of Computing. MIT Press, Cambridge (1992)"},{"issue":"6","key":"10_CR6","first-page":"35","volume":"32","author":"G. Heiser","year":"2007","unstructured":"Heiser, G.: Your system is secure? prove it! USENIX;login:\u00a032(6), 35\u201338 (December 2007)","journal-title":"USENIX ;login:"},{"key":"10_CR7","unstructured":"Leroy, X., Doligez, D., Garrigue, J., R\u00e9my, D., Vouillon, J.: The Objective Caml system, release 3.10 (May 2007), http:\/\/caml.inria.fr"},{"issue":"2","key":"10_CR8","doi-asserted-by":"crossref","first-page":"87","DOI":"10.5381\/jot.2003.2.2.c8","volume":"2","author":"B. Meyer","year":"2003","unstructured":"Meyer, B.: Proving pointer program properties. part 1: Context and overview. Journal of Object Technology\u00a02(2), 87\u2013108 (2003), http:\/\/www.jot.fm\/issues\/issue_2003_03\/column8","journal-title":"Journal of Object Technology"},{"key":"10_CR9","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1145\/800020.808263","volume-title":"SDE 1: Proceedings of the first ACM SIGSOFT\/SIGPLAN software engineering symposium on Practical software development environments","author":"K.J. Ottenstein","year":"1984","unstructured":"Ottenstein, K.J., Ottenstein, L.M.: The program dependence graph in a software development environment. In: Karl, J. (ed.) SDE 1: Proceedings of the first ACM SIGSOFT\/SIGPLAN software engineering symposium on Practical software development environments, pp. 177\u2013184. ACM Press, New York (1984)"},{"key":"10_CR10","unstructured":"Kent, S., Seo, K.: Security Architecture for the Internet Protocol. Request for comments (rfc) 4301, Network Working Group (December 2005), ftp:\/\/ftp.rfc-editor.org\/in-notes\/rfc4301.txt"},{"key":"10_CR11","doi-asserted-by":"crossref","first-page":"285","DOI":"10.2140\/pjm.1955.5.285","volume":"5","author":"A. Tarski","year":"1955","unstructured":"Tarski, A.: A lattice-theoretical fixpoint theorem and its applications. Pacific Journal of Mathematics\u00a05, 285\u2013309 (1955)","journal-title":"Pacific Journal of Mathematics"},{"key":"10_CR12","first-page":"121","volume":"3","author":"F. Tip","year":"1995","unstructured":"Tip, F.: A survey of program slicing techniques. Journal of programming languages\u00a03, 121\u2013189 (1995)","journal-title":"Journal of programming languages"},{"key":"10_CR13","unstructured":"Weiser, M.: Program slices: formal, psychological, and practical investigations of an automatic program abstraction method. PhD thesis, University of Michigan, Ann Arbor (1979)"},{"key":"10_CR14","first-page":"439","volume-title":"ICSE 1981: Proceedings of the 5th international conference on Software engineering","author":"M. Weiser","year":"1981","unstructured":"Weiser, M.: Program slicing. In: ICSE 1981: Proceedings of the 5th international conference on Software engineering, Piscataway, NJ, USA, pp. 439\u2013449. IEEE Press, Los Alamitos (1981)"},{"key":"10_CR15","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3054.001.0001","volume-title":"The formal semantics of programming languages: an introduction","author":"G. Winskel","year":"1993","unstructured":"Winskel, G.: The formal semantics of programming languages: an introduction. MIT Press, Cambridge (1993)"},{"issue":"2","key":"10_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1050849.1050865","volume":"30","author":"B. Xu","year":"2005","unstructured":"Xu, B., Qian, J., Zhang, X., Wu, Z., Chen, L.: A brief survey of program slicing. SIGSOFT Softw. Eng. Notes\u00a030(2), 1\u201336 (2005)","journal-title":"SIGSOFT Softw. Eng. Notes"}],"container-title":["Lecture Notes in Computer Science","Trusted Computing - Challenges and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68979-9_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:30:48Z","timestamp":1605763848000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68979-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540689782","9783540689799"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68979-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}