A. Aho, R. Sethi, and J. Ullman, Compilers: principles, techniques, and tools, 1986.

P. Briggs, K. Cooper, and L. Torczon, Improvements to graph coloring register allocation, ACM Transactions on Programming Languages and Systems, vol.16, issue.3, pp.428-455, 1994.
DOI : 10.1145/177492.177575

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.253

P. Brisset, Vers un vérifieur de bytecode Java certifié. Seminar given atÉcoleat´atÉcole Normale Supérieure, 1998.

G. Chaitin, Register allocation and spilling via graph coloring. SIGPLAN Notices, pp.98-105, 1982.
DOI : 10.1145/989393.989403

Z. Chen, Java Card Technology for Smart Cards: Architecture and Programmer's Guide. The Java Series, 2000.

R. Cohen, The defensive Java virtual machine specification, Computational Logic Inc, 1997.

S. Freund and J. Mitchell, The type system for object initialization in the Java bytecode language, ACM Transactions on Programming Languages and Systems, vol.21, issue.6, pp.1196-1250, 1999.
DOI : 10.1145/330643.330646

L. Gong, Inside Java 2 platform security: architecture, API design, and implementation. The Java Series, 1999.

J. Gosling, Java intermediate bytecodes, Proc. ACM SIGPLAN Workshop on Intermediate Representations, pp.111-118, 1995.
DOI : 10.1145/202530.202541

G. Grimaud, J. Lanet, and J. Vandewalle, FACADE: A Typed Intermediate Language Dedicated to Smart Cards, Software Engineering -ESEC/FSE '99, pp.476-493, 1999.
DOI : 10.1007/3-540-48166-4_29

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.6948

M. Hagiya and A. Tozawa, On a New Method for Dataflow Analysis of Java Virtual Machine Subroutines, LNCS 1503, pp.17-32, 1998.
DOI : 10.1007/3-540-49727-7_2

P. Hartel and L. Moreau, Formalizing the safety of Java, the Java virtual machine, and Java card, ACM Computing Surveys, vol.33, issue.4, 2001.
DOI : 10.1145/503112.503115

X. Leroy, Java Bytecode Verification: An Overview, Computer Aided Verification LNCS 2102, pp.265-285, 2001.
DOI : 10.1007/3-540-44585-4_26

URL : https://hal.archives-ouvertes.fr/hal-01499955

T. Lindholm and F. Yellin, The Java Virtual Machine Specification. The Java Series, 1999.

S. Muchnick, Advanced compiler design and implementation, 1997.

G. Necula, Proof-carrying code, Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '97, pp.106-119, 1997.
DOI : 10.1145/263699.263712

T. Nipkow, Verified Bytecode Verifiers, Foundations of Software Science and Computation Structures (FOSSACS'01), pp.347-363, 2001.
DOI : 10.1007/3-540-45315-6_23

O. Callahan and R. , A simple, comprehensive type system for Java bytecode subroutines, 26th symp. Principles of Progr. Lang, pp.70-78, 1999.

J. Posegga and H. Vogt, Java bytecode verification using model checking, Workshop Fundamental Underpinnings of Java, 1998.

C. Pusch, Proving the Soundness of a Java Bytecode Verifier Specification in Isabelle/HOL, TACAS'99, Cleaveland WR, pp.89-103, 1999.
DOI : 10.1007/3-540-49059-0_7

Z. Qian, A formal specification of Java virtual machine instructions for objects, methods and subroutines, Formal syntax and semantics of Java LNCS 1523, 1998.

Z. Qian, Standard fixpoint iteration for Java bytecode verification, ACM Transactions on Programming Languages and Systems, vol.22, issue.4, pp.638-672, 2000.
DOI : 10.1145/363911.363915

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.39.1730

E. Rose and K. Rose, Lightweight Bytecode Verification, Workshop Fundamental Underpinnings of Java, 1998.
DOI : 10.1023/B:JARS.0000021015.15794.82

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.647

R. Stärk, J. Schmid, and E. Börger, Java and the Java Virtual Machine, 2001.
DOI : 10.1007/978-3-642-59495-3

R. Stata and M. Abadi, A type system for Java bytecode subroutines, ACM Transactions on Programming Languages and Systems, vol.21, issue.1, pp.90-137, 1999.
DOI : 10.1145/314602.314606

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.152.2904

S. Microsystems, Java 2 platform micro edition technology for creating mobile devices. White paper, 2000.

G. Vigna, Mobile Agents and Security, LNCS, vol.1419, 1998.
DOI : 10.1007/3-540-68671-1

F. Yellin, Low level security in Java, Proc. 4th International World Wide Web Conference, pp.369-379, 1995.