G. Barbu, Fault attacks on a java card 3.0 virtual machine

G. Barthe, L. Beringer, P. Crégut, B. Grégoire, M. Hofmann et al., MOBIUS: Mobility, Ubiquity, Security, TGC, pp.10-29, 2006.
DOI : 10.1007/978-3-540-75336-0_2

S. Chaumette, I. Hatchondo, and D. Sauveron, Jcat: An environment for attack and test on java card&trade, Proceedings of CCCT03 and 9th ISAS03, pp.270-275, 2003.

N. Dragoni, F. Massacci, C. Schaefer, T. Walter, and E. Vtillard, A security-bycontracts architecture for pervasive services, Proceedings of 3rd Int'l Workshop on Security, Privacy and Trust in Ubiquitous Computing (SecPerU'07, 2007.

P. Kocher, J. Jaffe, and B. Jun, Differential Power Analysis, Advances in Cryptology -Crypto 99 LNCS proceedings, pp.388-397, 1999.
DOI : 10.1007/3-540-48405-1_25

J. Lanet and J. Iguchi-cartigny, Developing a trojan applet in a smart card, Journal in Computer Virology, vol.6, issue.1, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00463287

X. Leroy, Bytecode verification on Java smart cards, Software: Practice and Experience, vol.21, issue.4, pp.319-340, 2002.
DOI : 10.1002/spe.438

URL : https://hal.archives-ouvertes.fr/hal-01499944

W. Mostowski and E. Poll, Malicious Code on Java Card Smartcards: Attacks and Countermeasures, CARDIS '08: Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications, pp.1-16, 2008.
DOI : 10.1007/978-3-540-30569-9_7

D. Vermoen, M. F. Witteman, and G. Gaydadjiev, Reverse Engineering Java Card Applets Using Power Analysis, WISTP, pp.138-149, 2007.
DOI : 10.1109/TC.2002.1004593