The immunity of a system to malicious third parties trying to modify its behaviour (e.g. to perform unauthorized actions) is called security. Ensuring this feature in information and communication technologies is a requirement for establishing a trustworthy Information Society. Several strategies can be explored to deal with this problem. One of them, called program analysis, relies on formal tech ...