G. Barbu, G. Duc, and P. Hoogvorst, Java Card Operand Stack:??Fault Attacks, Combined Attacks and Countermeasures, pp.297-313
DOI : 10.1007/978-3-642-27257-8_19

URL : https://hal.archives-ouvertes.fr/hal-00692171

G. Barbu, C. Giraud, and V. Guerin, Embedded Eavesdropping on Java Card, SEC 2012. IFIP AICT, pp.37-48, 2012.
DOI : 10.1007/978-3-642-30436-1_4

URL : https://hal.archives-ouvertes.fr/hal-00706186

G. Barbu, P. Hoogvorst, and G. Duc, Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused, ESSoS 2012, pp.1-13, 2012.
DOI : 10.1007/978-3-642-28166-2_1

URL : https://hal.archives-ouvertes.fr/hal-00692173

G. Barbu, H. Thiebeauld, and V. Guerin, Attacks on Java Card 3.0 Combining Fault and Logical Attacks, CARDIS 2010, pp.148-163, 2010.
DOI : 10.1007/978-3-642-12510-2_11

URL : https://hal.archives-ouvertes.fr/hal-00692165

R. Berlach, M. Lackner, C. Steger, J. Loinig, and E. Haselsteiner, Memory-efficient on-card byte code verification for Java cards, Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2 '14, pp.37-40
DOI : 10.1145/2556315.2556323

G. Bouffard, J. Iguchi-cartigny, and J. L. Lanet, Combined Software and Hardware Attacks on the Java Card Control Flow, pp.283-296
DOI : 10.1007/978-3-642-27257-8_18

URL : https://hal.archives-ouvertes.fr/hal-00684616

J. Dubreuil, G. Bouffard, B. N. Thampi, and J. L. Lanet, Mitigating Type Confusion on Java Card, International Journal of Secure Software Engineering, vol.4, issue.2, pp.19-39, 2013.
DOI : 10.4018/jsse.2013040102

URL : https://hal.archives-ouvertes.fr/hal-00966327

E. Faugeron, Manipulating the frame information with an underflow attack, CARDIS 2013, pp.140-151, 2014.

S. Hamadouche, G. Bouffard, J. L. Lanet, B. Dorsemaine, B. Nouhant et al., Subverting byte code linker service to characterize java card api, Seventh Conference on Network and Information Systems Security (SAR-SSI), pp.75-81, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00937333

S. Hamadouche and J. L. Lanet, Virus in a smart card: Myth or reality?, Journal of Information Security and Applications, vol.18, issue.2-3, pp.2-3, 2013.
DOI : 10.1016/j.jisa.2013.08.005

J. Iguchi-cartigny and J. L. Lanet, Developing a Trojan applets in a smart card, Journal in Computer Virology, vol.8, issue.2, pp.343-351, 2010.
DOI : 10.1007/s11416-009-0135-3

J. Lancia, Java Card Combined Attacks with Localization-Agnostic Fault Injection, CARDIS 2012, pp.31-45, 2013.
DOI : 10.1007/978-3-642-37288-9_3

X. Leroy, Bytecode verification on Java smart cards, Software: Practice and Experience, vol.21, issue.4, pp.319-340, 2002.
DOI : 10.1002/spe.438

URL : https://hal.archives-ouvertes.fr/hal-01499944

G. Morana, E. Tramontana, and D. Zito, Detecting Attacks on Java Cards by Fingerprinting Applets, 2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp.359-364, 2013.
DOI : 10.1109/WETICE.2013.39

K. Nohl, Rooting SIM Cards. Speak at the Black Hat USA, p.2013, 2013.

T. Razafindralambo, G. Bouffard, and J. Lanet, A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard, DBSec 2012, pp.122-128, 2012.
DOI : 10.1007/978-3-642-31540-4_10

URL : https://hal.archives-ouvertes.fr/hal-00937307

T. Razafindralambo, G. Bouffard, B. N. Thampi, and J. Lanet, A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks, SNDS 2012. CCIS, pp.185-194, 2012.
DOI : 10.1007/978-3-642-34135-9_19

URL : https://hal.archives-ouvertes.fr/hal-00937272

A. Sere, J. Iguchi-cartigny, and J. L. Lanet, Evaluation of Countermeasures Against Fault Attacks on Smart Cards, Int. J. Secur. Appl, vol.5, issue.2, pp.49-61, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00685237

A. A. Séré, J. Iguchi-cartigny, and J. L. Lanet, Automatic detection of fault attack and countermeasures, Proceedings of the 4th Workshop on Embedded Systems Security, WESS '09, pp.978-981, 2009.
DOI : 10.1145/1631716.1631723