M. Witteman, Java Card Security, In: Information Security Bulletin, vol.., pp.291-298, 2003.

W. Mostowski and E. Poll, Malicious Code on Java Card Smartcards: Attacks and Countermeasures, Smart Card Research and Advanced Applications, 8th International Conference ? CARDIS 2008, pp.1-16, 2008.
DOI : 10.1007/978-3-540-30569-9_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.123.6078

A. Séré, J. Iguchi-cartigny, and J. L. Lanet, Automatic detection of fault attack and countermeasures, Proceedings of the 4th Workshop on Embedded Systems Security, WESS '09, pp.9-10, 2009.
DOI : 10.1145/1631716.1631723

J. Hogenboom and W. Mostowski, Full Memory Attack on a Java Card, 4th Benelux Workshop on Information and System Security, 2009.

J. Iguchi-cartigny and J. L. Lanet, Developing a Trojan applets in a smart card, Journal in Computer Virology, vol.8, issue.2, pp.343-351, 2010.
DOI : 10.1007/s11416-009-0135-3

T. Lindholm and F. Yellin, Java Virtual Machine Spec, 1999.

O. Corp, Virtual Machine Spec. ? Java Card Plateform, Version 3.0.4 Classic Ed, 2011.

O. Corp, Application Programming Interface Java Card Platform, Version 3.0.4 Classic Ed, 2011.

O. Corp, Runtime Environment Spec., Java Card Platform, Version 3

S. Microsystems-inc, Virtual Machine Spec. ? Java Card Plateform, Version 3.0.1 Connected Ed, 2009.

S. Microsystems-inc, Application Programming Interface Java Card Platform, Version 3.0.1 Connected Ed, 2009.

S. Microsystems-inc, Runtime Environment Spec., Java Card Platform, Version 3.0.1 Connected Ed, 2009.

G. Barbu, Fault Attacks on Java Card 3 Virtual Machine In: e-Smart'09, 2009.

. Bellcore, New Threat Model Breaks Crypto Codes, Press Release, 1996.

D. Boneh, R. Demillo, and R. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, Advances in Cryptology ? EUROCRYPT '97, pp.37-51, 1997.
DOI : 10.1007/3-540-69053-0_4

G. Piret and J. J. Quisquater, A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad, Cryptographic Hardware and Embedded Systems ? CHES 2003, pp.77-88, 2003.
DOI : 10.1007/978-3-540-45238-6_7

C. Giraud and H. Thiebeauld, A Survey on Fault Attacks, pp.159-176, 2004.
DOI : 10.1007/1-4020-8147-2_11

H. Bar-el, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan, The Sorcerer's Apprentice Guide to Fault Attacks, Proceedings of the IEEE, vol.94, issue.2, pp.370-382, 2006.
DOI : 10.1109/JPROC.2005.862424

O. Vertanen, Java Type Confusion and Fault Attacks, LNCS, vol.4236, pp.237-251, 2006.
DOI : 10.1007/11889700_21

S. Skorobogatov and R. Anderson, Optical Fault Induction Attacks, Cryptographic Hardware and Embedded Systems ? CHES 2002, pp.2-12, 2002.
DOI : 10.1007/3-540-36400-5_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.9.5680

J. J. Quisquater and D. Samyde, Eddy Current for Magnetic Analysis with Active Sensor, pp.e-Smart, 2002.

E. Vétillard and A. Ferrari, Combined Attacks and Countermeasures, Smart Card Research and Advanced Applications, 9th International Conference ? CARDIS 2010, pp.133-147, 2010.
DOI : 10.1007/978-3-642-12510-2_10

G. Barbu, H. Thiebeauld, and V. Guerin, Attacks on Java Card 3.0 Combining Fault and Logical Attacks, Smart Card Research and Advanced Applications, 9th International Conference ? CARDIS 2010, pp.148-163, 2010.
DOI : 10.1007/978-3-642-12510-2_11

URL : https://hal.archives-ouvertes.fr/hal-00692165

G. Bouffard, J. Iguchi-cartigny, and J. L. Lanet, Combined Software and Hardware Attacks on the Java Card Control Flow, 10th International Conference ? CARDIS 2011, 2011.
DOI : 10.1007/978-3-642-27257-8_18

URL : https://hal.archives-ouvertes.fr/hal-00684616

G. Barbu and H. Thiebeauld, Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.0 -, Smart Card Research and Advanced Applications, 10th International Conference ? CARDIS 2011, pp.18-33, 2011.
DOI : 10.1007/978-3-642-27257-8_2

URL : https://hal.archives-ouvertes.fr/hal-00692172

G. Barbu, G. Duc, and P. Hoogvorst, Java Card Operand Stack:??Fault Attacks, Combined Attacks and Countermeasures, Smart Card Research and Advanced Applications, 10th International Conference ? CARDIS 2011, pp.297-313, 2011.
DOI : 10.1007/978-3-642-27257-8_19

URL : https://hal.archives-ouvertes.fr/hal-00692171

G. Bouffard and J. L. Lanet, The Next Smart Card Nightmare, Logical Attacks, Combined Attacks, Mutant Applications and Other Funny Things, pp.405-424, 2012.
DOI : 10.1007/978-3-642-28368-0_26

URL : https://hal.archives-ouvertes.fr/hal-00684662

G. Barbu, P. Hoogvorst, and G. Duc, Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused, International Symposium on Engineering Secure Software and Systems ? ESSoS 2012, 2012.
DOI : 10.1007/978-3-642-28166-2_1

URL : https://hal.archives-ouvertes.fr/hal-00692173

G. Barbu, On the Security of Java Card Platforms against Hardware Attacks, 2012.
URL : https://hal.archives-ouvertes.fr/pastel-00834324

S. Govindavajhala and A. Appel, Using memory errors to attack a virtual machine, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), pp.154-165, 2003.
DOI : 10.1109/SECPRI.2003.1199334

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.608

J. Lancia, Java Card Combined Attacks with Localization-Agnostic Fault Injection, 11th International Conference ? CARDIS 2012, pp.31-45, 2013.
DOI : 10.1007/978-3-642-37288-9_3

J. Dubreuil, G. Bouffard, J. L. Lanet, and J. Cartigny, Type Classification against Fault Enabled Mutant in Java Based Smart Card, 2012 Seventh International Conference on Availability, Reliability and Security, pp.551-556, 2012.
DOI : 10.1109/ARES.2012.24

URL : https://hal.archives-ouvertes.fr/hal-00937292

P. Girard and B. Gonzalvo, Making Secure Downloaded Application in Particular in a Smart Card. Publication Number, pp.2266222-7168625, 2003.