M. Witteman, Java Card Security, In: Information Security Bulletin, vol.., pp.291-298, 2003.

W. Mostowski and E. Poll, Malicious Code on Java Card Smartcards: Attacks and Countermeasures, CARDIS 2008, pp.1-16, 2008.
DOI : 10.1007/978-3-540-30569-9_7

A. A. Sere, J. Iguchi-cartigny, and J. L. Lanet, Automatic detection of fault attack and countermeasures, Proceedings of the 4th Workshop on Embedded Systems Security, WESS '09, pp.9-10, 2009.
DOI : 10.1145/1631716.1631723

J. Hogenboom and W. Mostowski, Full Memory Attack on a Java Card, 4th Benelux Workshop on Information and System Security, 2009.

J. Iguchi-cartigny and J. L. Lanet, Developing a Trojan applets in a smart card, Journal in Computer Virology, vol.8, issue.2, pp.343-351, 2010.
DOI : 10.1007/s11416-009-0135-3

T. Lindholm and F. Yellin, Java Virtual Machine Specification, 1999.

P. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, CRYPTO '99, pp.388-397, 1999.
DOI : 10.1007/3-540-48405-1_25

K. Gandolfi, C. Mourtel, and F. Olivier, Electromagnetic Analysis: Concrete Results, CHES 2001, pp.251-261, 2001.
DOI : 10.1007/3-540-44709-1_21

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5990

C. Giraud and H. Thiebeauld, A Survey on Fault Attacks, CARDIS 2004, pp.159-176, 2004.
DOI : 10.1007/1-4020-8147-2_11

H. Bar-el, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan, The Sorcerer's Apprentice Guide to Fault Attacks, Proceedings of the IEEE, vol.94, issue.2, pp.370-382, 2006.
DOI : 10.1109/JPROC.2005.862424

S. Skorobogatov and R. Anderson, Optical Fault Induction Attacks, CHES 2002, pp.2-12, 2002.
DOI : 10.1007/3-540-36400-5_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.9.5680

J. J. Quisquater and D. Samyde, Eddy Current for Magnetic Analysis with Active Sensor, pp.e-Smart, 2002.

G. Barbu, Fault Attacks on Java Card 3 Virtual Machine In: e-Smart'09, 2009.

G. Barbu, G. Duc, and P. Hoogvorst, Java Card Operand Stack:??Fault Attacks, Combined Attacks and Countermeasures, CARDIS 2011, pp.297-313, 2011.
DOI : 10.1007/978-3-642-27257-8_19

URL : https://hal.archives-ouvertes.fr/hal-00692171

G. Barbu, P. Hoogvorst, and G. Duc, Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused, ESSoS 2012, 2012.
DOI : 10.1007/978-3-642-28166-2_1

URL : https://hal.archives-ouvertes.fr/hal-00692173

E. Vétillard and A. Ferrari, Combined Attacks and Countermeasures, CARDIS 2010, pp.133-147, 2010.
DOI : 10.1007/978-3-642-12510-2_10

G. Barbu and H. Thiebeauld, Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.0 -, CARDIS 2011, pp.18-33, 2011.
DOI : 10.1007/978-3-642-27257-8_2

URL : https://hal.archives-ouvertes.fr/hal-00692172

G. Barbu, H. Thiebeauld, and V. Guerin, Attacks on Java Card 3.0 Combining Fault and Logical Attacks, CARDIS 2010, pp.148-163, 2010.
DOI : 10.1007/978-3-642-12510-2_11

URL : https://hal.archives-ouvertes.fr/hal-00692165

G. Inc, GlobalPlatform Card Specification 2.2, 2011.

G. Inc, GlobalPlatform Card Specification 2.2, Amendment C, 2010.

G. Inc, Java Card Contactless API and Export File for Card Specification v2.2.1 (org.globalplatform.contactless) v1, 2011.