Java Card Security, In: Information Security Bulletin, vol.., pp.291-298, 2003. ,
Malicious Code on Java Card Smartcards: Attacks and Countermeasures, Smart Card Research and Advanced Applications, 8th International Conference ? CARDIS 2008, pp.1-16, 2008. ,
DOI : 10.1007/978-3-540-30569-9_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.123.6078
Automatic detection of fault attack and countermeasures, Proceedings of the 4th Workshop on Embedded Systems Security, WESS '09, pp.9-10, 2009. ,
DOI : 10.1145/1631716.1631723
Full Memory Attack on a Java Card, 4th Benelux Workshop on Information and System Security, 2009. ,
Developing a Trojan applets in a smart card, Journal in Computer Virology, vol.8, issue.2, pp.343-351, 2010. ,
DOI : 10.1007/s11416-009-0135-3
Java Virtual Machine Spec, 1999. ,
Virtual Machine Spec. ? Java Card Plateform, Version 3.0.4 Classic Ed, 2011. ,
Application Programming Interface Java Card Platform, Version 3.0.4 Classic Ed, 2011. ,
Runtime Environment Spec., Java Card Platform, Version 3 ,
Virtual Machine Spec. ? Java Card Plateform, Version 3.0.1 Connected Ed, 2009. ,
Application Programming Interface Java Card Platform, Version 3.0.1 Connected Ed, 2009. ,
Runtime Environment Spec., Java Card Platform, Version 3.0.1 Connected Ed, 2009. ,
Fault Attacks on Java Card 3 Virtual Machine In: e-Smart'09, 2009. ,
New Threat Model Breaks Crypto Codes, Press Release, 1996. ,
On the Importance of Checking Cryptographic Protocols for Faults, Advances in Cryptology ? EUROCRYPT '97, pp.37-51, 1997. ,
DOI : 10.1007/3-540-69053-0_4
A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad, Cryptographic Hardware and Embedded Systems ? CHES 2003, pp.77-88, 2003. ,
DOI : 10.1007/978-3-540-45238-6_7
A Survey on Fault Attacks, pp.159-176, 2004. ,
DOI : 10.1007/1-4020-8147-2_11
The Sorcerer's Apprentice Guide to Fault Attacks, Proceedings of the IEEE, vol.94, issue.2, pp.370-382, 2006. ,
DOI : 10.1109/JPROC.2005.862424
Java Type Confusion and Fault Attacks, LNCS, vol.4236, pp.237-251, 2006. ,
DOI : 10.1007/11889700_21
Optical Fault Induction Attacks, Cryptographic Hardware and Embedded Systems ? CHES 2002, pp.2-12, 2002. ,
DOI : 10.1007/3-540-36400-5_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.9.5680
Eddy Current for Magnetic Analysis with Active Sensor, pp.e-Smart, 2002. ,
Combined Attacks and Countermeasures, Smart Card Research and Advanced Applications, 9th International Conference ? CARDIS 2010, pp.133-147, 2010. ,
DOI : 10.1007/978-3-642-12510-2_10
Attacks on Java Card 3.0 Combining Fault and Logical Attacks, Smart Card Research and Advanced Applications, 9th International Conference ? CARDIS 2010, pp.148-163, 2010. ,
DOI : 10.1007/978-3-642-12510-2_11
URL : https://hal.archives-ouvertes.fr/hal-00692165
Combined Software and Hardware Attacks on the Java Card Control Flow, 10th International Conference ? CARDIS 2011, 2011. ,
DOI : 10.1007/978-3-642-27257-8_18
URL : https://hal.archives-ouvertes.fr/hal-00684616
Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.0 -, Smart Card Research and Advanced Applications, 10th International Conference ? CARDIS 2011, pp.18-33, 2011. ,
DOI : 10.1007/978-3-642-27257-8_2
URL : https://hal.archives-ouvertes.fr/hal-00692172
Java Card Operand Stack:??Fault Attacks, Combined Attacks and Countermeasures, Smart Card Research and Advanced Applications, 10th International Conference ? CARDIS 2011, pp.297-313, 2011. ,
DOI : 10.1007/978-3-642-27257-8_19
URL : https://hal.archives-ouvertes.fr/hal-00692171
The Next Smart Card Nightmare, Logical Attacks, Combined Attacks, Mutant Applications and Other Funny Things, pp.405-424, 2012. ,
DOI : 10.1007/978-3-642-28368-0_26
URL : https://hal.archives-ouvertes.fr/hal-00684662
Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused, International Symposium on Engineering Secure Software and Systems ? ESSoS 2012, 2012. ,
DOI : 10.1007/978-3-642-28166-2_1
URL : https://hal.archives-ouvertes.fr/hal-00692173
On the Security of Java Card Platforms against Hardware Attacks, 2012. ,
URL : https://hal.archives-ouvertes.fr/pastel-00834324
Using memory errors to attack a virtual machine, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), pp.154-165, 2003. ,
DOI : 10.1109/SECPRI.2003.1199334
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.608
Java Card Combined Attacks with Localization-Agnostic Fault Injection, 11th International Conference ? CARDIS 2012, pp.31-45, 2013. ,
DOI : 10.1007/978-3-642-37288-9_3
Type Classification against Fault Enabled Mutant in Java Based Smart Card, 2012 Seventh International Conference on Availability, Reliability and Security, pp.551-556, 2012. ,
DOI : 10.1109/ARES.2012.24
URL : https://hal.archives-ouvertes.fr/hal-00937292
Making Secure Downloaded Application in Particular in a Smart Card. Publication Number, pp.2266222-7168625, 2003. ,