{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:21:52Z","timestamp":1725574912493},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642180699"},{"type":"electronic","value":"9783642180705"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-18070-5_7","type":"book-chapter","created":{"date-parts":[[2011,1,15]],"date-time":"2011-01-15T14:18:02Z","timestamp":1295101082000},"page":"92-106","source":"Crossref","is-referenced-by-count":12,"title":["Sawja: Static Analysis Workshop for Java"],"prefix":"10.1007","author":[{"given":"Laurent","family":"Hubert","sequence":"first","affiliation":[]},{"given":"Nicolas","family":"Barr\u00e9","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Besson","sequence":"additional","affiliation":[]},{"given":"Delphine","family":"Demange","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Jensen","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Monfort","sequence":"additional","affiliation":[]},{"given":"David","family":"Pichardie","sequence":"additional","affiliation":[]},{"given":"Tiphaine","family":"Turpin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Bacon, D.F., Sweeney, P.F.: Fast static analysis of C++ virtual function calls. In: Proc. of OOPSLA 1996, pp. 324\u2013341 (1996)","DOI":"10.1145\/236337.236371"},{"key":"7_CR2","unstructured":"Bicolano - web home, http:\/\/mobius.inria.fr\/bicolano"},{"key":"7_CR3","first-page":"196","volume-title":"Proc. of PLDI 2003","author":"B. Blanchet","year":"2003","unstructured":"Blanchet, B., Cousot, P., Cousot, R., Feret, J., Mauborgne, L., Min\u00e9, A., Monniaux, D., Rival, X.: A static analyzer for large safety-critical software. In: Proc. of PLDI 2003, San Diego, California, USA, June 7\u201314, pp. 196\u2013207. ACM Press, New York (2003)"},{"issue":"10","key":"7_CR4","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1145\/1639949.1640108","volume":"44","author":"M. Bravenboer","year":"2009","unstructured":"Bravenboer, M., Smaragdakis, Y.: Strictly declarative specification of sophisticated points-to analyses. SIGPLAN Not.\u00a044(10), 243\u2013262 (2009)","journal-title":"SIGPLAN Not."},{"issue":"3","key":"7_CR5","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1145\/136035.136043","volume":"24","author":"R.E. Bryant","year":"1992","unstructured":"Bryant, R.E.: Symbolic Boolean manipulation with ordered binary-decision diagrams. ACM Computing Survey\u00a024(3), 293\u2013318 (1992)","journal-title":"ACM Computing Survey"},{"key":"7_CR6","first-page":"129","volume-title":"Proc. of JAVA 1999","author":"M.G. Burke","year":"1999","unstructured":"Burke, M.G., Choi, J., Fink, S., Grove, D., Hind, M., Sarkar, V., Serrano, M.J., Sreedhar, V.C., Srinivasan, H., Whaley, J.: The Jalape\u00f1o dynamic optimizing compiler for Java. In: Proc. of JAVA 1999, pp. 129\u2013141. ACM, New York (1999)"},{"key":"7_CR7","unstructured":"Clerc, X.: Barista, http:\/\/barista.x9c.fr\/"},{"key":"7_CR8","unstructured":"The Coq Proof Assistant, http:\/\/coq.inria.fr\/"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/3-540-49538-X_5","volume-title":"ECOOP \u201995 - Object-Oriented Programming","author":"J. Dean","year":"1995","unstructured":"Dean, J., Grove, D., Chambers, C.: Optimization of object-oriented programs using static class hierarchy analysis. In: Olthoff, W. (ed.) ECOOP 1995. LNCS, vol.\u00a0952, pp. 77\u2013101. Springer, Heidelberg (1995)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Demange, D., Jensen, T., Pichardie, D.: A provably correct stackless intermediate representation for Java bytecode. Research Report 7021, INRIA (2009), http:\/\/www.irisa.fr\/celtique\/ext\/bir\/rr7021.pdf","DOI":"10.1007\/978-3-642-17164-2_8"},{"issue":"8","key":"7_CR11","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/368892.368907","volume":"1","author":"A.P. Ershov","year":"1958","unstructured":"Ershov, A.P.: On programming of arithmetic operations. Commun. ACM\u00a01(8), 3\u20136 (1958)","journal-title":"Commun. ACM"},{"issue":"6","key":"7_CR12","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1145\/506315.506316","volume":"23","author":"D. Grove","year":"2001","unstructured":"Grove, D., Chambers, C.: A framework for call graph construction algorithms. Toplas\u00a023(6), 685\u2013746 (2001)","journal-title":"Toplas"},{"key":"7_CR13","first-page":"36","volume-title":"Proc. of PASTE 2008","author":"L. Hubert","year":"2008","unstructured":"Hubert, L.: A Non-Null annotation inferencer for Java bytecode. In: Proc. of PASTE 2008, pp. 36\u201342. ACM, New York (November 2008)"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-642-15497-3_7","volume-title":"Computer Security \u2013 ESORICS 2010","author":"L. Hubert","year":"2010","unstructured":"Hubert, L., Jensen, T., Monfort, V., Pichardie, D.: Enforcing secure object initialization in java. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol.\u00a06345, pp. 101\u2013115. Springer, Heidelberg (2010)"},{"key":"7_CR15","unstructured":"IBM: The T.J. Watson Libraries for Analysis (Wala), http:\/\/wala.sourceforge.net"},{"key":"#cr-split#-7_CR16.1","doi-asserted-by":"crossref","unstructured":"Jensen, T., Pichardie, D.: Secure the clones: Static enforcement of policies for secure object copying. Technical report, INRIA (June 2010);","DOI":"10.1007\/978-3-642-19718-5_17"},{"key":"#cr-split#-7_CR16.2","unstructured":"Presented at OWASP (2010)"},{"key":"7_CR17","unstructured":"Leroy, X., Doligez, D., Garrigue, J., R\u00e9my, D., Vouillon, J.: The Objective Caml system, Inria (May 2007), http:\/\/caml.inria.fr\/ocaml\/"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/3-540-36579-6_12","volume-title":"Compiler Construction","author":"O. Lhot\u00e1k","year":"2003","unstructured":"Lhot\u00e1k, O., Hendren, L.: Scaling java points-to analysis using SPARK. In: Wang, H. (ed.) CC 2003. LNCS, vol.\u00a02622, pp. 153\u2013169. Springer, Heidelberg (2003)"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Lhot\u00e1k, O., Hendren, L.: Evaluating the benefits of context-sensitive points-to analysis using a BDD-based implementation. ACM Trans. Softw. Eng. Methodol.\u00a018(1) (2008)","DOI":"10.1145\/1391984.1391987"},{"key":"7_CR20","volume-title":"The JavaTM Virtual Machine Specification","author":"T. Lindholm","year":"1999","unstructured":"Lindholm, T., Yellin, F.: The JavaTM Virtual Machine Specification, 2nd edn. Prentice Hall PTR, Englewood Cliffs (1999)","edition":"2"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/11575467_11","volume-title":"Programming Languages and Systems","author":"V.B. Livshits","year":"2005","unstructured":"Livshits, V.B., Whaley, J., Lam, M.S.: Reflection analysis for java. In: Yi, K. (ed.) APLAS 2005. LNCS, vol.\u00a03780, pp. 139\u2013160. Springer, Heidelberg (2005)"},{"key":"7_CR22","volume-title":"Java Virtual Machine","author":"J. Meyer","year":"1997","unstructured":"Meyer, J., Downing, T.: Java Virtual Machine. O\u2019Reilly Associates, Sebastopol (1997), http:\/\/jasmin.sourceforge.net"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Morrison, D.R.: PATRICIA \u2014\u00a0Practical algorithm to retrieve information coded in alphanumeric. J. ACM\u00a015(4) (1968)","DOI":"10.1145\/321479.321481"},{"key":"7_CR24","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1145\/1596550.1596582","volume-title":"Proc. of ICFP","author":"B. Pagano","year":"2009","unstructured":"Pagano, B., Andrieu, O., Moniot, T., Canou, B., Chailloux, E., Wang, P., Manoury, P., Cola\u00e7o, J.L.: Experience report: using Objective Caml to develop safety-critical embedded tools in a certification framework. In: Proc. of ICFP, pp. 215\u2013220. ACM, New York (2009)"},{"issue":"3-4","key":"7_CR25","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1023\/B:JARS.0000021015.15794.82","volume":"31","author":"E. Rose","year":"2003","unstructured":"Rose, E.: Lightweight bytecode verification. J. Autom. Reason.\u00a031(3-4), 303\u2013334 (2003)","journal-title":"J. Autom. Reason."},{"key":"7_CR26","unstructured":"Spoto, F.: Julia: A generic static analyser for the Java bytecode. In: Proc. of the Workshop FTfJP (2005)"},{"key":"7_CR27","first-page":"149","volume-title":"Proc. of POPL 1998","author":"R. Stata","year":"1998","unstructured":"Stata, R., Abadi, M.: A type system for Java bytecode subroutines. In: Proc. of POPL 1998, pp. 149\u2013160. ACM Press, New York (1998)"},{"key":"7_CR28","first-page":"281","volume-title":"Proc. of OOPSLA 2000","author":"F. Tip","year":"2000","unstructured":"Tip, F., Palsberg, J.: Scalable propagation-based call graph construction algorithms. In: Proc. of OOPSLA 2000, pp. 281\u2013293. ACM Press, New York (October 2000)"},{"key":"7_CR29","unstructured":"Vall\u00e9e-Rai, R., Co, P., Gagnon, E., Hendren, L., Lam, P., Sundaresan, V.: Soot - A Java bytecode optimization framework. In: Proc. of CASCON 1999 (1999)"},{"key":"7_CR30","unstructured":"Whaley, J.: Dynamic optimization through the use of automatic runtime specialization. Master\u2019s thesis, Massachusetts Institute of Technology (May 1999)"}],"container-title":["Lecture Notes in Computer Science","Formal Verification of Object-Oriented Software"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-18070-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T13:18:38Z","timestamp":1637155118000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-18070-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642180699","9783642180705"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-18070-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}