{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:53:10Z","timestamp":1743018790662,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319167626"},{"type":"electronic","value":"9783319167633"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16763-3_1","type":"book-chapter","created":{"date-parts":[[2015,3,16]],"date-time":"2015-03-16T11:54:23Z","timestamp":1426506863000},"page":"3-17","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Memory Forensics of a Java Card Dump"],"prefix":"10.1007","author":[{"given":"Jean-Louis","family":"Lanet","sequence":"first","affiliation":[]},{"given":"Guillaume","family":"Bouffard","sequence":"additional","affiliation":[]},{"given":"Rokia","family":"Lamrani","sequence":"additional","affiliation":[]},{"given":"Ranim","family":"Chakra","sequence":"additional","affiliation":[]},{"given":"Afef","family":"Mestiri","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Monsif","sequence":"additional","affiliation":[]},{"given":"Abdellatif","family":"Fandi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,17]]},"reference":[{"key":"1_CR1","first-page":"73","volume":"2002","author":"C Aum\u00fcller","year":"2002","unstructured":"Aum\u00fcller, C., Bier, P., Hofreiter, P., Fischer, W., Seifert, J.P.: Fault attacks on RSA with CRT: concrete results and practical countermeasures. IACR Cryptol. ePrint Arch. 2002, 73 (2002)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"1_CR2","unstructured":"Barbu, G.: On the security of Java Card platforms against hardware attacks. Ph.D. thesis, T\u00c9L\u00c9COM ParisTech (2012)"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-12510-2_11","volume-title":"Smart Card Research and Advanced Application","author":"G Barbu","year":"2010","unstructured":"Barbu, G., Thiebeauld, H., Guerin, V.: Attacks on java card 3.0 combining fault and logical attacks. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 148\u2013163. Springer, Heidelberg (2010)"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-642-27257-8_18","volume-title":"Smart Card Research and Advanced Applications","author":"G Bouffard","year":"2011","unstructured":"Bouffard, G., Iguchi-Cartigny, J., Lanet, J.-L.: Combined software and hardware attacks on the java card control flow. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol. 7079, pp. 283\u2013296. Springer, Heidelberg (2011)"},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.diin.2008.05.003","volume":"5","author":"B Dolan-Gavitt","year":"2008","unstructured":"Dolan-Gavitt, B.: Forensic analysis of the windows registry in memory. Digit. Invest. 5, 26\u201332 (2008)","journal-title":"Digit. Invest."},{"key":"1_CR6","volume-title":"The Index of Coincidence and Its Applications in Cryptography","author":"WF Friedman","year":"1922","unstructured":"Friedman, W.F.: The Index of Coincidence and Its Applications in Cryptography. Aegean Park Press, Laguna Hills (1922)"},{"key":"1_CR7","unstructured":"Hamadouche, S., Bouffard, G., Lanet, J.L., Dorsemaine, B., Nouhant, B., Magloire, A., Reygnaud, A.: Subverting byte code linker service to characterize java card API. In: Seventh Conference on Network and Information Systems Security (SAR-SSI), pp. 75\u201381, 22\u201325 May 2012. https:\/\/sarssi2012.greyc.fr\/"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-540-28632-5_19","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"L Hemme","year":"2004","unstructured":"Hemme, L.: A differential fault attack against early rounds of (Triple-)DES. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 254\u2013267. Springer, Heidelberg (2004)"},{"key":"1_CR9","unstructured":"Hex Rays: IDA Pro Disassembler and Debugger"},{"key":"1_CR10","unstructured":"Klein, T.: All your private keys are belong to us. Technical report, trapkit (Feb 2006)"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-642-37288-9_3","volume-title":"Smart Card Research and Advanced Applications","author":"J Lancia","year":"2013","unstructured":"Lancia, J.: Java card combined attacks with localization-agnostic fault injection. In: Mangard, S. (ed.) CARDIS 2012. LNCS, vol. 7771, pp. 31\u201345. Springer, Heidelberg (2013)"},{"key":"1_CR12","unstructured":"Oracle: Java Card 3 Platform, Virtual Machine Specification, Classic Edition 3.0.0. Oracle (September 2011)"},{"key":"1_CR13","volume-title":"Security Warrior - Know Your Enemy","author":"C Peikari","year":"2004","unstructured":"Peikari, C., Chuvakin, A.: Security Warrior - Know Your Enemy. O\u2019Reilly, Sebastopol (2004)"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-540-45238-6_7","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"G Piret","year":"2003","unstructured":"Piret, G., Quisquater, J.-J.: A differential fault attack technique against spn structures, with application to the AES and KHAZAD. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 77\u201388. Springer, Heidelberg (2003)"},{"key":"1_CR15","unstructured":"Platform: Card Specification v2.2. (March 2006)"},{"key":"1_CR16","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-642-34135-9_19","volume-title":"Recent Trends in Computer Networks and Distributed Systems Security","author":"T Razafindralambo","year":"2012","unstructured":"Razafindralambo, T., Bouffard, G., Thampi, B.N., Lanet, J.-L.: A dynamic syntax interpretation for java based smart card to mitigate logical attacks. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds.) SNDS 2012. CCIS, vol. 335, pp. 185\u2013194. Springer, Heidelberg (2012)"},{"issue":"Supplement\u20131","key":"1_CR17","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.diin.2006.06.010","volume":"3","author":"A Schuster","year":"2006","unstructured":"Schuster, A.: Searching for processes and threads in microsoft windows memory dumps. Digit. Invest. 3(Supplement\u20131), 10\u201316 (2006)","journal-title":"Digit. Invest."},{"key":"1_CR18","unstructured":"Walters, A., Petroni, N.: Integrating volatile memory forensics into the digital investigation process. In: Blackhat Hat DC (2007)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16763-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T20:16:06Z","timestamp":1674072966000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16763-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319167626","9783319167633"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16763-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}