{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:31:14Z","timestamp":1742920274835,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642191244"},{"type":"electronic","value":"9783642191251"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19125-1_4","type":"book-chapter","created":{"date-parts":[[2011,1,24]],"date-time":"2011-01-24T05:55:45Z","timestamp":1295848545000},"page":"43-57","source":"Crossref","is-referenced-by-count":2,"title":["On-Device Control Flow Verification for Java Programs"],"prefix":"10.1007","author":[{"given":"Arnaud","family":"Fontaine","sequence":"first","affiliation":[]},{"given":"Samuel","family":"Hym","sequence":"additional","affiliation":[]},{"given":"Isabelle","family":"Simplot-Ryl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/3-540-45165-X_3","volume-title":"Java on Smart Cards: Programming and Security","author":"P. Bieber","year":"2001","unstructured":"Bieber, P., Cazin, J., Wiels, V., Zanon, G., El-Marouani, A., Girard, P., Lanet, J.L.: The PACAP Prototype: A Tool for Detecting Java Card Illegal Flow (chapter 3). In: Attali, I., Jensen, T. (eds.) JavaCard 2000. LNCS, vol.\u00a02041, pp. 25\u201337. Springer, Heidelberg (2001)"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/978-3-540-85893-5_3","volume-title":"Smart Card Research and Advanced Applications","author":"D. Ghindici","year":"2008","unstructured":"Ghindici, D., Simplot-Ryl, I.: On Practical Information Flow Policies for Java-Enabled Multiapplication Smart Cards. In: Grimaud, G., Standaert, F.X. (eds.) CARDIS 2008. LNCS, vol.\u00a05189, pp. 32\u201347. Springer, Heidelberg (2008)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Yoshioka, N., Washizaki, H., Maruyama, K.: A survey on security patterns. Progress in Informatics\u00a0(5), 35\u201347 (2008)","DOI":"10.2201\/NiiPi.2008.5.5"},{"issue":"7","key":"4_CR4","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/j.ic.2008.03.003","volume":"206","author":"D. Gurov","year":"2008","unstructured":"Gurov, D., Huisman, M., Sprenger, C.: Compositional verification of sequential programs with procedures. Information and Computation\u00a0206(7), 840\u2013868 (2008)","journal-title":"Information and Computation"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-24721-0_6","volume-title":"Fundamental Approaches to Software Engineering","author":"M. Huisman","year":"2004","unstructured":"Huisman, M., Gurov, D., Sprenger, C., Chugunov, G.: Checking absence of illicit applet interactions, a\u00a0case\u00a0study. In: Wermelinger, M., Margaria-Steffen, T. (eds.) FASE 2004. LNCS, vol.\u00a02984, pp. 84\u201398. Springer, Heidelberg (2004)"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/3-540-45923-5_2","volume-title":"Fundamental Approaches to Software Engineering","author":"G. Barthe","year":"2002","unstructured":"Barthe, G., Gurov, D., Huisman, M.: Compositional verification of secure applet interactions. In: Kutsche, R.-D., Weber, H. (eds.) FASE 2002. LNCS, vol.\u00a02306, pp. 15\u201332. Springer, Heidelberg (2002)"},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/CSFW.2004.1310732","volume-title":"Proceedings of the 17th workshop on Computer Security Foundations (CSFW 2004)","author":"F. Besson","year":"2004","unstructured":"Besson, F., Blanc, T., Fournet, C., Gordon, A.D.: From stack inspection to access control: a security analysis for libraries. In: Proceedings of the 17th workshop on Computer Security Foundations (CSFW 2004), p. 61. IEEE Computer Society, Los Alamitos (2004)"},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1145\/1368310.1368327","volume-title":"Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008)","author":"A.P. Sistla","year":"2008","unstructured":"Sistla, A.P., Venkatakrishnan, V.N., Zhou, M., Branske, H.: CMV: automatic verification of complete mediation for java virtual machines. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008), pp. 100\u2013111. ACM, New York (2008)"},{"issue":"4","key":"4_CR9","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1002\/spe.438","volume":"32","author":"X. Leroy","year":"2002","unstructured":"Leroy, X.: Bytecode verification on Java smart cards. Software \u2013 Practice & Experience\u00a032(4), 319\u2013340 (2002)","journal-title":"Software \u2013 Practice & Experience"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-540-72354-7_16","volume-title":"Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems","author":"D. Ghindici","year":"2007","unstructured":"Ghindici, D., Grimaud, G., Simplot-Ryl, I.: An Information Flow Verifier for Small Embedded Systems. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol.\u00a04462, pp. 189\u2013201. Springer, Heidelberg (2007)"},{"key":"4_CR11","first-page":"106","volume-title":"Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 1997","author":"G.C. Necula","year":"1997","unstructured":"Necula, G.C.: Proof-carrying code. In: Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 1997, pp. 106\u2013119. ACM, New York (1997)"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"369","DOI":"10.3233\/JCS-2002-10404","volume":"10","author":"P. Bieber","year":"2002","unstructured":"Bieber, P., Cazin, J., Girard, P., Lanet, J.L., Wiels, V., Zanon, G.: Checking Secure Interactions of Smart Card Applets: extended version. Journal of Computer Security\u00a010, 369\u2013398 (2002)","journal-title":"Journal of Computer Security"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-540-73408-6_21","volume-title":"Public Key Infrastructure","author":"N. Dragoni","year":"2007","unstructured":"Dragoni, N., Massacci, F., Naliuka, K., Siahaan, I.: Security-by-contract: Toward a semantics for digital signatures on mobile code. In: L\u00f3pez, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, vol.\u00a04582, pp. 297\u2013312. Springer, Heidelberg (2007)"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Dragoni, N., Massacci, F., Schaefer, C., Walter, T., Vetillard, E.: A Security-by-Contract Architecture for Pervasive Services. In: SECPerU, pp. 49\u201354 (2007)","DOI":"10.1109\/SECPERU.2007.2"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Ion, I., Dragovic, B., Crispo, B.: Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices. In: ACSAC, pp. 233\u2013242 (2007)","DOI":"10.1109\/ACSAC.2007.36"},{"key":"4_CR16","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/ACSAC.2009.39","volume-title":"Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC 2009)","author":"M. Ongtang","year":"2009","unstructured":"Ongtang, M., McLaughlin, S., Enck, W., McDaniel, P.: Semantically rich application-centric security in Android. In: Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC 2009), pp. 340\u2013349. IEEE Computer Society, Los Alamitos (2009)"},{"key":"4_CR17","first-page":"235","volume-title":"CCS 2009","author":"W. Enck","year":"2009","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: CCS 2009, Chicago, IL, USA, pp. 235\u2013245. ACM, New York (November 2009)"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19125-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T18:46:58Z","timestamp":1548442018000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19125-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642191244","9783642191251"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19125-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}