Compilers: principles, techniques, and tools, 1986. ,
Improvements to graph coloring register allocation, ACM Transactions on Programming Languages and Systems, vol.16, issue.3, pp.428-455, 1994. ,
DOI : 10.1145/177492.177575
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.253
Vers un vérifieur de bytecode Java certifié. Seminar given atÉcoleat´atÉcole Normale Supérieure, 1998. ,
Register allocation and spilling via graph coloring. SIGPLAN Notices, pp.98-105, 1982. ,
DOI : 10.1145/989393.989403
Java Card Technology for Smart Cards: Architecture and Programmer's Guide. The Java Series, 2000. ,
The defensive Java virtual machine specification, Computational Logic Inc, 1997. ,
The type system for object initialization in the Java bytecode language, ACM Transactions on Programming Languages and Systems, vol.21, issue.6, pp.1196-1250, 1999. ,
DOI : 10.1145/330643.330646
Inside Java 2 platform security: architecture, API design, and implementation. The Java Series, 1999. ,
Java intermediate bytecodes, Proc. ACM SIGPLAN Workshop on Intermediate Representations, pp.111-118, 1995. ,
DOI : 10.1145/202530.202541
FACADE: A Typed Intermediate Language Dedicated to Smart Cards, Software Engineering -ESEC/FSE '99, pp.476-493, 1999. ,
DOI : 10.1007/3-540-48166-4_29
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.6948
On a New Method for Dataflow Analysis of Java Virtual Machine Subroutines, LNCS 1503, pp.17-32, 1998. ,
DOI : 10.1007/3-540-49727-7_2
Formalizing the safety of Java, the Java virtual machine, and Java card, ACM Computing Surveys, vol.33, issue.4, 2001. ,
DOI : 10.1145/503112.503115
Java Bytecode Verification: An Overview, Computer Aided Verification LNCS 2102, pp.265-285, 2001. ,
DOI : 10.1007/3-540-44585-4_26
URL : https://hal.archives-ouvertes.fr/hal-01499955
The Java Virtual Machine Specification. The Java Series, 1999. ,
Advanced compiler design and implementation, 1997. ,
Proof-carrying code, Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '97, pp.106-119, 1997. ,
DOI : 10.1145/263699.263712
Verified Bytecode Verifiers, Foundations of Software Science and Computation Structures (FOSSACS'01), pp.347-363, 2001. ,
DOI : 10.1007/3-540-45315-6_23
A simple, comprehensive type system for Java bytecode subroutines, 26th symp. Principles of Progr. Lang, pp.70-78, 1999. ,
Java bytecode verification using model checking, Workshop Fundamental Underpinnings of Java, 1998. ,
Proving the Soundness of a Java Bytecode Verifier Specification in Isabelle/HOL, TACAS'99, Cleaveland WR, pp.89-103, 1999. ,
DOI : 10.1007/3-540-49059-0_7
A formal specification of Java virtual machine instructions for objects, methods and subroutines, Formal syntax and semantics of Java LNCS 1523, 1998. ,
Standard fixpoint iteration for Java bytecode verification, ACM Transactions on Programming Languages and Systems, vol.22, issue.4, pp.638-672, 2000. ,
DOI : 10.1145/363911.363915
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.39.1730
Lightweight Bytecode Verification, Workshop Fundamental Underpinnings of Java, 1998. ,
DOI : 10.1023/B:JARS.0000021015.15794.82
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.647
Java and the Java Virtual Machine, 2001. ,
DOI : 10.1007/978-3-642-59495-3
A type system for Java bytecode subroutines, ACM Transactions on Programming Languages and Systems, vol.21, issue.1, pp.90-137, 1999. ,
DOI : 10.1145/314602.314606
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.152.2904
Java 2 platform micro edition technology for creating mobile devices. White paper, 2000. ,
Mobile Agents and Security, LNCS, vol.1419, 1998. ,
DOI : 10.1007/3-540-68671-1
Low level security in Java, Proc. 4th International World Wide Web Conference, pp.369-379, 1995. ,