1. [1] Aho, A.V., Sethi, R. and Ullman, J.D.: Compilers: Principles, Techniques and Tools, Addison-Wesley (1986).
2. [2] Akai, K. and Matsumoto, T.: An Evaluation Model of Tamper Resistant Software, Computer Security Symposium (CSS 2004), pp.253-258 (2004).
3. [3] Arnold, K., Gosling, J. and Holmes, D.: The Java Programming Language, Addison-Wesley, 3rd edition (2000).
4. [4] Aucsmith, D.: Tamper resistant software: An implementation, Information Hiding: First International Workshop, Anderson, R.J.(ed.), Lecture Notes in Computer Science, Vol.1174, Springer-Verlag, pp.317-333 (1996).
5. Complexity of points-to analysis of Java in the presence of exceptions