A. Aiken, J. S. Foster, J. Kodumal, and T. Terauchi, Checking and inferring local non-aliasing, Proc. of PLDI '03, pp.129-140, 2003.
DOI : 10.1145/781131.781146

URL : http://cgis.cs.umd.edu/~jfoster/papers/pldi03.ps.gz

Z. Anderson, D. Gay, and M. Naik, Lightweight annotations for controlling sharing in concurrent data structures, Proc. of PLDI'09, pp.98-109, 2009.

B. Blanchet, Escape analysis for object-oriented languages: Application to Java, Proc. of OOPSLA, pp.20-34, 1999.
DOI : 10.1145/320385.320387

J. Bloch, JSR 175: A metadata facility for the Java programming language, 2004.

J. D. Choi, M. G. , M. J. Serrano, V. C. Sreedhar, and S. P. Midkiff, Escape analysis for Java, Proc. of OOPSLA, pp.1-19, 1999.
DOI : 10.1145/320385.320386

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.224.353

D. Clarke, J. Potter, and J. Noble, Ownership types for flexible alias protection, Proc. of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, OOPSLA '98, pp.48-64, 1998.

P. Cousot and R. Cousot, Abstract interpretation, Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages , POPL '77, pp.238-252, 1977.
DOI : 10.1145/512950.512973

URL : https://hal.archives-ouvertes.fr/inria-00528590

S. Drossopoulou and J. Noble, Trust the Clones, FoVEOOS 2011 -preproceedings, 2011.

M. Fähndrich and K. R. Leino, Declaring and checking non-null types in an object-oriented language, Proc. of OOPSLA'03, pp.302-312, 2003.

L. Hubert, T. Jensen, and D. Pichardie, Semantic Foundations and Inference of Non-null Annotations, Proc. of FMOODS'08, pp.132-149, 2008.
DOI : 10.1007/978-3-540-68863-1_9

URL : https://hal.archives-ouvertes.fr/inria-00332356

T. Jensen, F. Kirchner, and D. Pichardie, Secure the Clones, Proc. of 20th European Symposium on Programming, 2011.
DOI : 10.1006/inco.1996.2613

URL : https://hal.archives-ouvertes.fr/hal-00762377

J. Noble, J. Potter, and J. Vitek, Flexible alias protection, Proc. of ECOOP'98, pp.158-185, 1998.
DOI : 10.1007/BFb0054091

P. W. O-'hearn, H. Yang, and J. C. Reynolds, Separation and information hiding, Proc. of POPL'04, pp.268-280, 2004.

S. Sagiv, T. W. Reps, and R. Wilhelm, Parametric shape analysis via 3-valued logic, ACM Transactions on Programming Languages and Systems, vol.24, issue.3, pp.217-298, 2002.
DOI : 10.1145/514188.514190

. Sun-developer and . Network, Secure Coding Guidelines for the Java Programming Language, 2010.

M. Tofte and J. Talpin, Region-Based Memory Management, Information and Computation, vol.132, issue.2, pp.109-176, 1997.
DOI : 10.1006/inco.1996.2613