}. , {. Allenbach, and P. , Java Card 3 : Classic Functionality Gets a Connectivity Boost, access denied. 5. } References 1, 2009.

R. Anderson and M. Kuhn, Tamper Resistance ? a Cautionary Note, Proceedings of the 2nd USENIX Workshop on Electronic Commerce, USENIX Association, pp.1-11, 1996.

C. Aumüller, P. Bier, W. Fischer, P. Hofreiter, and J. P. Seifert, Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures, Cryptographic Hardware and Embedded Systems (CHES'02, pp.260-275, 2002.
DOI : 10.1007/3-540-36400-5_20

G. Barbu, Fault Attacks on Java Card 3 Virtual Machine In: e-Smart'09, 2009.

R. Bauduin, Fault Attacks, an Intuitive Approach In: Fault Diagnosis and Tolerance in Cryptography (FDTC´06), 2006.

D. Boneh, R. Demillo, and R. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, Advances in Cryptology -EUROCRYPT'97, pp.37-51, 1997.
DOI : 10.1007/3-540-69053-0_4

C. Giraud and H. Thiebeauld, A Survey on Fault Attacks, Smart Card Research and Advanced Application Conference (CARDIS'04). LNCS, pp.159-176, 2004.
DOI : 10.1007/1-4020-8147-2_11

G. Inc, GlobalPlatform Card Specification 2.1.1, 2003.

G. Inc, GlobalPlatform Card Specification 2.2, 2006.

S. Govindavajhala and A. Appel, Using memory errors to attack a virtual machine, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), 2003.
DOI : 10.1109/SECPRI.2003.1199334

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.608

K. Hyppönen, Use of Cryptographic Codes for Bytecode Verification in Smartcard Environment, 2003.

J. Iguchi-cartigny and J. L. Lanet, ´ Evaluation de l'injection de code malicieux dans une Java Card, Symposium sur la Sécurité des Technologies de l'Information et de la Communication, 2009.

P. Kocher, J. Jaffe, and B. Jun, Introduction to Differential Power Analysis and Related Attacks, Cryptography Research Inc, 1998.

P. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, Advances in Cryptology -CRYPTO'99, pp.388-397, 1999.
DOI : 10.1007/3-540-48405-1_25

T. Lindholm and F. Yellin, The Java Virtual Machine Specification, 1999.

W. Mostowski and E. Poll, Malicious Code on Java Card Smartcards: Attacks and Countermeasures, Smart Card Research and Advanced Application Conference (CARDIS'08). LNCS, pp.1-16, 2008.
DOI : 10.1007/978-3-540-30569-9_7

D. Vermoen, M. Witteman, and G. Gaydadjiev, Reverse Engineering Java Card Applets Using Power Analysis, Proceedings of the 1st Workshop on Information Security Theory and Practice (WISTP'07, 2007.
DOI : 10.1109/TC.2002.1004593

M. Witteman, Java Card Security, In: Information Security Bulletin, vol.8, pp.291-298, 2003.