Author:
Mesbah Abdelhak,Lanet Jean-Louis,Mezghiche Mohamed
Subject
Law,General Computer Science
Reference31 articles.
1. Attacks on Java Card 3.0 Combining Fault and Logical Attacks;Barbu,2010
2. Reversing the operating system of a java based smart card;Bouffard;J Comput Virol Hack Tech,2014
3. Combined software and hardware attacks on the Java Card control flow;Bouffard,2011
4. Reverse engineering and design recovery: a taxonomy;Chikofsky;IEEE Softw,1990
5. Decompilation of binary programs;Cifuentes;Softw Pract Exper,1995
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM;International Journal of Information Security;2018-02-22
2. Anti-Reverse-Engineering Tool of Executable Files on the Windows Platform;22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC);2017-07
3. The Z-Wave routing protocol and its security implications;Computers & Security;2017-07