L
Lilian Burdy
Researcher at French Institute for Research in Computer Science and Automation
Publications - 20
Citations - 1537
Lilian Burdy is an academic researcher from French Institute for Research in Computer Science and Automation. The author has contributed to research in topics: Java & Java applet. The author has an hindex of 9, co-authored 19 publications receiving 1524 citations.
Papers
More filters
Journal ArticleDOI
An overview of JML tools and applications
Lilian Burdy,Yoonsik Cheon,David R. Cok,Michael D. Ernst,Joseph R. Kiniry,Gary T. Leavens,K. Rustan M. Leino,Erik Poll +7 more
TL;DR: An overview of the main ideas behind JML, details about JML’s wide range of tools, and a glimpse into existing applications of JML are given.
Journal ArticleDOI
An overview of JML tools and applications
Lilian Burdy,Yoonsik Cheon,David R. Cok,Michael D. Ernst,Joseph R. Kiniry,Gary T. Leavens,K. Rustan,M. Leino,Erik Poll +8 more
TL;DR: An overview of the main ideas behind JML, the dierent groups collaborating to provide tools for J ML, and the existing applications of JML is given.
Book ChapterDOI
Java Applet Correctness: A Developer-Oriented Approach
TL;DR: In this article, the authors present a tool that allows to formally prove Java classes annotated with JML, an annotation language for Java that provides a framework for specifying class invariants and methods behaviours.
Book ChapterDOI
JACK: a tool for validation of security and behaviour of Java applications
Gilles Barthe,Lilian Burdy,Julien Charles,Benjamin Grégoire,Marieke Huisman,Jean-Louis Lanet,Mariela Pavlova,Antoine Requet +7 more
TL;DR: The main features of JACK (Java Applet Correctness Kit), a tool for the validation of Java applications, annotated with JML specifications, are described, which makes it particularly suitable for a proof carrying code scenario.
Book ChapterDOI
Enforcing High-Level Security Properties for Applets
TL;DR: Smart card applications often handle privacy-sensitive information, and therefore must obey certain security policies, which are described as high-level security properties, stating for example that no pin verification must take place within a transaction.