References
- Seontae Kim, Jemin Kim, Joonseok Park, and Weonhee Yoo, "Implementation of Stackless Intermediate Representation Language for Java Bytecode," The Journal of Korean Institute of Information Technology, Vol. 9, No. 9, pp. 129-138, Sep. 2011.
- R. W. Floyd, "Assigning meaning to programs," Mathematical Aspects of Computer Science, Vol. 19, pp. 19-32, 1967. https://doi.org/10.1090/psapm/019/0235771
- C. A. R. Hoare, "An axiomatic basis for computer programming," Communication of the ACM, Vol. 12, No. 10, pp. 576-580, Oct. 1969. https://doi.org/10.1145/363235.363259
- Cormac Flanagan, K. Rustan M. Leino, Mark Lillibridge, Greg Nelson, James B. Saxe, and Raymie Stata, "Extended static checking for Java," SIGPLAN Not. Vol. 37, No. 5, pp. 234-245, May 2002. https://doi.org/10.1145/543552.512558
- Lilian Burdy, Yoonsik Cheon, David R. Cok, et al. "An overview of JML tools and applications," International Journal on Software Tools for Technology Transfer, Vol. 7, No. 3, pp. 212-232, June 2005. https://doi.org/10.1007/s10009-004-0167-4
- David Detlefs, Greg Nelson, and James B. Saxe, "Simplify: a theorem prover for program checking," Journal of ACM, Vol. 52, No. 3, pp. 365-473, May 2005. https://doi.org/10.1145/1066100.1066102
- Gilles Barthe, Lilian Burdy, Julien Charles, et al. "JACK: a tool for validation of security and behaviour of Java applications," In Proceedings of the 5th international conference on Formal methods for components and objects, pp. 152-174, 2007.
- Mike Barnett, K. Rustan M. Leino, and Wolfram Schulte, "The Spec# Programming System: An Overview," LNCS, Vol. 3362, 2004.
- Jemin Kim, Joonseok Park, Weonhee Yoo, "A Design of Verification Framework for Java Bytecode," Journal of the Korea Society of Digital Industry and Information Management, Vol. 7, No. 2. pp. 29-37, June 2011.
- Lilian Burdy, Marieke Huisman and Mariela Pavlova, "Preliminary Design of BML: A Behavioral Interface Specification Language for Java bytecode," LNCS, Vol. 4422, pp. 215-229, 2007.
- Eiffel Software, http://www.eiffel.com
- J. M. Jazequel, B. Meyer, "Design by contract: the lessons of Ariane," Computer, Vol. 30, No. 1, pp. 129-130, Jan. 1997. https://doi.org/10.1109/2.562936
- John Barnes, "High Integrity Software: The SPARK Approach to Safety and Security," Addison Wesley, March 2005.
- H. Lehner and P. Müller, "Formal translation of bytecode into BoogiePL," Electron. Notes Theor. Comput. Sci., Vol. 190, No. 1, pp. 35-50, 2007. https://doi.org/10.1016/j.entcs.2007.02.059
- E. W. Dijkstra, "A Discipline of Programming," Prentice Hall, Oct. 1976.
- Jimin Kim, Kitae Kim, Jemin Kim, and Weonhee Yoo, "Static Type Inference Based on Static Single Assignment for Bytecode," Journal of the Korea Society of Computer and Information, Vol. 11, No. 4, pp. 87-96, Sep. 2006.
- C. Flanagan and J. B. Saxe, "Avoiding exponential explosion: generating compact verification conditions," SIGPLAN Not., Vol. 36, No. 3, pp. 193-205, 2001. https://doi.org/10.1145/373243.360220
- M. Barnett and Rustan, "Weakest-precondition of unstructured programs," in PASTE '05: Proceedings of the 6th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering, pp. 82-87, 2005.
- Z. Manna, "Mathematical Theory of Computation," Dover Publications, 2003.
- Kyungsoo Kim and Weonhee Yoo, "A Study on Intermediated code for Analyzing Bytecodes," Journal of the Korea Society of Computer and Information, Vol. 11, No. 1, pp. 107-117, Mar. 2006.