ISO 7816 ,
Functional specification of the openpgp application on iso smart card operating systems ,
Fuzzing and overflows in java card smart cards, SSTIC, 2016. ,
When time meets test, International Journal of Information Security, vol.17, issue.4, pp.395-409, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01818793
Un framework de fuzzing pour cartes a puce: application aux protocoles ,
EMV integrated circuit card specifications for payment systems ,
Détection de vulnérabilités appliquéeà la vérification de code intermédiaire de java card ,
Vanguard: Detecting missing checks for prognosing potential vulnerabilities, p.5, 2018. ,
Detecting missing-check bugs via semantic-and context-aware criticalness and constraints inferences, 28th {USENIX} Security Symposium ({USENIX} Security 19), pp.1769-1786, 2019. ,
Protection of systems against fuzzing attacks, pp.156-172, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01976753
Chucky: Exposing missing checks in source code for vulnerability discovery, pp.499-510, 2013. ,
Normalization of java source codes, pp.29-40, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01976747
Javaneighbors: Improving chuckyjava's neighborhood discovery algorithm, Procedia Computer Science, vol.160, pp.70-76, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-01950822
, A gentle introduction to the bag-of-words model, pp.2019-2026
Understanding inverse document frequency: on theoretical arguments for idf, Journal of documentation, vol.60, issue.5, pp.503-520, 2004. ,
An introduction to latent semantic analysis, Discourse processes, vol.25, issue.2-3, pp.259-284, 1998. ,
Comprehensive survey on distance/similarity measures between probability density functions, City, vol.1, issue.2, p.1, 2007. ,
Evaluating the performance of lsa for sourcecode plagiarism detection, Informatica, 2013. ,