1. Alloy website, http://alloy.mit.edu.
2. Java and Java Virtual Machine security vulnerabilities and their exploitation techniques, http://www.blackhat.com/presentations/bh-asia-02/LSD/bh-asia-02-lsd.pdf.
3. Software Abstractions: Logic, Language and Analysis;Jackson,2006
4. Lightweight modeling of java virtual machine security constraints;Reynolds,2010
5. Securing Java: Getting Down to Business with Mobile Code;McGraw,1999