1. Alloy website,
http://alloy.mit.edu
2. Jackson, D.: Software Abstractions: Logic, Language and Analysis. MIT Press, Cambridge (2006)
3. McGraw, G., Felten, E.: Securing Java: Getting Down to Business with Mobile Code, 2nd edn. Wiley, New York (1999)
4. Common Vulnerabilities and Exposures,
http://cve.mitre.org
5. BlackBox Security Advisory,
http://www.ca.com/us/securityadvisor/virusinfo/virus.aspx?ID=36725