Java Card Operand Stack:??Fault Attacks, Combined Attacks and Countermeasures, Prouff [16], pp.297-313 ,
DOI : 10.1007/978-3-642-27257-8_19
URL : https://hal.archives-ouvertes.fr/hal-00692171
Embedded Eavesdropping on Java Card, SEC. IFIP Advances in Information and Communication Technology, pp.37-48, 2012. ,
DOI : 10.1007/978-3-642-30436-1_4
URL : https://hal.archives-ouvertes.fr/hal-00706186
Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused, ESSoS. Lecture Notes in Computer Science, vol.7159, pp.1-13, 2012. ,
DOI : 10.1007/978-3-642-28166-2_1
URL : https://hal.archives-ouvertes.fr/hal-00692173
Attacks on Java Card 3.0 Combining Fault and Logical Attacks, CARDIS. Lecture Notes in Computer Science, vol.6035, pp.148-163, 2010. ,
DOI : 10.1007/978-3-642-12510-2_11
URL : https://hal.archives-ouvertes.fr/hal-00692165
Combined Software and Hardware Attacks on the Java Card Control Flow, pp.283-296, 2011. ,
DOI : 10.1007/978-3-642-27257-8_18
URL : https://hal.archives-ouvertes.fr/hal-00684616
Combined Software and Hardware Attacks on the Java Card Control Flow, pp.283-296 ,
DOI : 10.1007/978-3-642-27257-8_18
URL : https://hal.archives-ouvertes.fr/hal-00684616
Reversing the operating system of a Java based smart card, Journal of Computer Virology and Hacking Techniques, vol.56, issue.1, pp.239-253, 2014. ,
DOI : 10.1007/s11416-014-0218-7
URL : https://hal.archives-ouvertes.fr/hal-01024393
Electromagnetic Side Channels of an FPGA Implementation of AES, IACR Cryptology ePrint Archive, p.145, 2004. ,
Manipulating the frame information with an underflow attack, pp.140-151 ,
Manipulating the Frame Information With an Underflow Attack ,
Virus in a smart card: Myth or reality?, Journal of Information Security and Applications, pp.130-137, 2013. ,
DOI : 10.1016/j.jisa.2013.08.005
Developing a Trojan applets in a smart card, Journal in Computer Virology, vol.8, issue.2, pp.343-351, 2010. ,
DOI : 10.1007/s11416-009-0135-3
Smart Card Research and Advanced Applications -10th IFIP WG 8.8/11, International Conference, 2011. ,
A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard, Lecture Notes in Computer Science, vol.7371, pp.122-128, 2012. ,
DOI : 10.1007/978-3-642-31540-4_10
URL : https://hal.archives-ouvertes.fr/hal-00937307
Reverse Engineering Java Card Applets Using Power Analysis, pp.138-149, 2007. ,
DOI : 10.1109/TC.2002.1004593