Java Card Operand Stack:??Fault Attacks, Combined Attacks and Countermeasures, pp.297-313 ,
DOI : 10.1007/978-3-642-27257-8_19
URL : https://hal.archives-ouvertes.fr/hal-00692171
Embedded Eavesdropping on Java Card, SEC 2012. IFIP AICT, pp.37-48, 2012. ,
DOI : 10.1007/978-3-642-30436-1_4
URL : https://hal.archives-ouvertes.fr/hal-00706186
Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused, ESSoS 2012, pp.1-13, 2012. ,
DOI : 10.1007/978-3-642-28166-2_1
URL : https://hal.archives-ouvertes.fr/hal-00692173
Attacks on Java Card 3.0 Combining Fault and Logical Attacks, CARDIS 2010, pp.148-163, 2010. ,
DOI : 10.1007/978-3-642-12510-2_11
URL : https://hal.archives-ouvertes.fr/hal-00692165
Memory-efficient on-card byte code verification for Java cards, Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2 '14, pp.37-40 ,
DOI : 10.1145/2556315.2556323
Combined Software and Hardware Attacks on the Java Card Control Flow, pp.283-296 ,
DOI : 10.1007/978-3-642-27257-8_18
URL : https://hal.archives-ouvertes.fr/hal-00684616
Mitigating Type Confusion on Java Card, International Journal of Secure Software Engineering, vol.4, issue.2, pp.19-39, 2013. ,
DOI : 10.4018/jsse.2013040102
URL : https://hal.archives-ouvertes.fr/hal-00966327
Manipulating the frame information with an underflow attack, CARDIS 2013, pp.140-151, 2014. ,
Subverting byte code linker service to characterize java card api, Seventh Conference on Network and Information Systems Security (SAR-SSI), pp.75-81, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00937333
Virus in a smart card: Myth or reality?, Journal of Information Security and Applications, vol.18, issue.2-3, pp.2-3, 2013. ,
DOI : 10.1016/j.jisa.2013.08.005
Developing a Trojan applets in a smart card, Journal in Computer Virology, vol.8, issue.2, pp.343-351, 2010. ,
DOI : 10.1007/s11416-009-0135-3
Java Card Combined Attacks with Localization-Agnostic Fault Injection, CARDIS 2012, pp.31-45, 2013. ,
DOI : 10.1007/978-3-642-37288-9_3
Bytecode verification on Java smart cards, Software: Practice and Experience, vol.21, issue.4, pp.319-340, 2002. ,
DOI : 10.1002/spe.438
URL : https://hal.archives-ouvertes.fr/hal-01499944
Detecting Attacks on Java Cards by Fingerprinting Applets, 2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp.359-364, 2013. ,
DOI : 10.1109/WETICE.2013.39
Rooting SIM Cards. Speak at the Black Hat USA, p.2013, 2013. ,
A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard, DBSec 2012, pp.122-128, 2012. ,
DOI : 10.1007/978-3-642-31540-4_10
URL : https://hal.archives-ouvertes.fr/hal-00937307
A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks, SNDS 2012. CCIS, pp.185-194, 2012. ,
DOI : 10.1007/978-3-642-34135-9_19
URL : https://hal.archives-ouvertes.fr/hal-00937272
Evaluation of Countermeasures Against Fault Attacks on Smart Cards, Int. J. Secur. Appl, vol.5, issue.2, pp.49-61, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00685237
Automatic detection of fault attack and countermeasures, Proceedings of the 4th Workshop on Embedded Systems Security, WESS '09, pp.978-981, 2009. ,
DOI : 10.1145/1631716.1631723