Author:
Lancia Julien,Bouffard Guillaume
Publisher
Springer International Publishing
Reference24 articles.
1. Barbu, G., Duc, G., Hoogvorst, P.: Java card operand stack: fault attacks, combined attacks and countermeasures. In: Prouff, E. (ed.) [21], pp. 297–313 (2011)
2. Lecture Notes in Computer Science;G Barbu,2010
3. Berlach, R., Lackner, M., Steger, C., Loinig, J., Haselsteiner, E.: Memory-efficient on-card byte code verification for Java cards. In: Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2 2014, pp. 37–40. ACM, New York (2014)
4. Bouffard, G.: A generic approach for protecting Java card smart card against software attacks. Ph.D. thesis, University of Limoges, Limoges, France, October 2014
5. Bouffard, G., Iguchi-Cartigny, J., Lanet, J.: Combined software and hardware attacks on the java card control flow. In: Prouff, E. (ed.) [21], pp. 283–296
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. PhiAttack;Smart Card Research and Advanced Applications;2022
2. Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM;International Journal of Information Security;2018-02-22
3. Logical Attacks on Secured Containers of the Java Card Platform;Smart Card Research and Advanced Applications;2017
4. Trust can be misplaced;Journal of Cryptographic Engineering;2016-11-01
5. Chronicle of a Java Card death;Journal of Computer Virology and Hacking Techniques;2016-05-17