A. Aiken, J. S. Foster, J. Kodumal, and T. Terauchi, Checking and inferring local non-aliasing, Proc. of PLDI '03, pp.129-140, 2003.

Z. Anderson, D. Gay, and M. Naik, Lightweight annotations for controlling sharing in concurrent data structures, Proc. of PLDI'09, pp.98-109, 2009.

B. Blanchet, Escape analysis for object-oriented languages: Application to Java, Proc. of OOPSLA, pp.20-34, 1999.

J. Bloch, JSR 175: A metadata facility for the Java programming language CERT. The CERT Sun Microsystems Secure Coding Standard for Java, 2004.

J. D. Choi, M. G. , M. J. Serrano, V. C. Sreedhar, and S. P. Midkiff, Escape analysis for java, Proc. of OOPSLA, pp.1-19, 1999.

P. Cousot and R. Cousot, Abstract interpretation, Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages , POPL '77, pp.238-252, 1977.
DOI : 10.1145/512950.512973

URL : https://hal.archives-ouvertes.fr/hal-01108790

M. Fähndrich and K. R. Leino, Declaring and checking non-null types in an objectoriented language, Proc. of OOPSLA'03, pp.302-312, 2003.

L. Hubert, T. Jensen, and D. Pichardie, Semantic Foundations and Inference of Non-null Annotations, Proc. of FMOODS'08, pp.132-149, 2008.
DOI : 10.1007/978-3-540-68863-1_9

URL : https://hal.archives-ouvertes.fr/inria-00332356

T. Jensen, F. Kirchner, and D. Pichardie, Secure the clones Extended version, 2010.

P. W. O-'hearn, H. Yang, and J. C. Reynolds, Separation and information hiding, Proc. of POPL'04, pp.268-280, 2004.

S. Sagiv, T. W. Reps, and R. Wilhelm, Parametric shape analysis via 3-valued logic, ACM Transactions on Programming Languages and Systems, vol.24, issue.3, pp.217-298, 2002.
DOI : 10.1145/514188.514190

. Sun-develper and . Network, Secure Coding Guidelines for the Java Programming Language, 2010.

M. Tofte and J. Talpin, Region-Based Memory Management, Information and Computation, vol.132, issue.2, pp.109-176, 1997.
DOI : 10.1006/inco.1996.2613

URL : http://doi.org/10.1006/inco.1996.2613