{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:41:13Z","timestamp":1743061273399,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319167626"},{"type":"electronic","value":"9783319167633"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16763-3_2","type":"book-chapter","created":{"date-parts":[[2015,3,16]],"date-time":"2015-03-16T11:54:23Z","timestamp":1426506863000},"page":"18-31","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Heap $$\\ldots $$ Hop! Heap Is Also Vulnerable"],"prefix":"10.1007","author":[{"given":"Guillaume","family":"Bouffard","sequence":"first","affiliation":[]},{"given":"Michael","family":"Lackner","sequence":"additional","affiliation":[]},{"given":"Jean-Louis","family":"Lanet","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Loinig","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,17]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Barbu, G., Duc, G., Hoogvorst, P.: Java card operand stack: fault attacks, combined attacks and countermeasures. In: Prouff [19], pp. 297\u2013313","DOI":"10.1007\/978-3-642-27257-8_19"},{"key":"2_CR2","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-30436-1_4","volume-title":"Information Security and Privacy Research","author":"G Barbu","year":"2012","unstructured":"Barbu, G., Giraud, C., Guerin, V.: Embedded eavesdropping on java card. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol. 376, pp. 37\u201348. Springer, Heidelberg (2012)"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-28166-2_1","volume-title":"Engineering Secure Software and Systems","author":"G Barbu","year":"2012","unstructured":"Barbu, G., Hoogvorst, P., Duc, G.: Application-replay attack on java cards: when the garbage collector gets confused. In: Barthe, G., Livshits, B., Scandariato, R. (eds.) ESSoS 2012. LNCS, vol. 7159, pp. 1\u201313. Springer, Heidelberg (2012)"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-12510-2_11","volume-title":"Smart Card Research and Advanced Application","author":"G Barbu","year":"2010","unstructured":"Barbu, G., Thiebeauld, H., Guerin, V.: Attacks on java card 3.0 combining fault and logical attacks. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 148\u2013163. Springer, Heidelberg (2010)"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Berlach, R., Lackner, M., Steger, C., Loinig, J., Haselsteiner, E.: Memory-efficient On-card Byte Code Verification for Java Cards. In: Proceedings of the First Workshop on Cryptography and Security in Computing Systems. CS2 2014, pp. 37\u201340. ACM, New York (2014)","DOI":"10.1145\/2556315.2556323"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Bouffard, G., Iguchi-Cartigny, J., Lanet, J.L.: Combined software and hardware attacks on the java card control flow. In: Prouff [19], pp. 283\u2013296","DOI":"10.1007\/978-3-642-27257-8_18"},{"issue":"2","key":"2_CR7","first-page":"19","volume":"4","author":"J Dubreuil","year":"2013","unstructured":"Dubreuil, J., Bouffard, G., Thampi, B.N., Lanet, J.L.: Mitigating Type Confusion on Java Card. IJSSE 4(2), 19\u201339 (2013)","journal-title":"IJSSE"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-319-08302-5_10","volume-title":"Smart Card Research and Advanced Applications","author":"E Faugeron","year":"2014","unstructured":"Faugeron, E.: Manipulating the frame information with an underflow attack. In: Francillon, A., Rohatgi, P. (eds.) CARDIS 2013. LNCS, vol. 8419, pp. 140\u2013151. Springer, Heidelberg (2014)"},{"key":"2_CR9","unstructured":"GlobalPlatform: Card Specification. GlobalPlatform Inc., 2.2.1 edn., January 2011"},{"key":"2_CR10","unstructured":"Hamadouche, S., Bouffard, G., Lanet, J.L., Dorsemaine, B., Nouhant, B., Magloire, A., Reygnaud, A.: Subverting byte code linker service to characterize java card api. In: Seventh Conference on Network and Information Systems Security (SAR-SSI), pp. 75\u201381 (22\u201325 May 2012)"},{"issue":"2\u20133","key":"2_CR11","first-page":"130","volume":"18","author":"S Hamadouche","year":"2013","unstructured":"Hamadouche, S., Lanet, J.L.: Virus in a smart card: Myth or reality? J. Inf. Secur. Appl. 18(2\u20133), 130\u2013137 (2013)","journal-title":"J. Inf. Secur. Appl."},{"issue":"4","key":"2_CR12","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s11416-009-0135-3","volume":"6","author":"J Iguchi-Cartigny","year":"2010","unstructured":"Iguchi-Cartigny, J., Lanet, J.L.: Developing a Trojan applets in a smart card. J. Comput. Virol. 6(4), 343\u2013351 (2010)","journal-title":"J. Comput. Virol."},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-642-37288-9_3","volume-title":"Smart Card Research and Advanced Applications","author":"J Lancia","year":"2013","unstructured":"Lancia, J.: Java card combined attacks with localization-agnostic fault injection. In: Mangard, S. (ed.) CARDIS 2012. LNCS, vol. 7771, pp. 31\u201345. Springer, Heidelberg (2013)"},{"issue":"4","key":"2_CR14","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1002\/spe.438","volume":"32","author":"X Leroy","year":"2002","unstructured":"Leroy, X.: Bytecode verification on Java smart cards. Softw. Pract. Exper. 32(4), 319\u2013340 (2002)","journal-title":"Softw. Pract. Exper."},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Morana, G., Tramontana, E., Zito, D.: Detecting Attacks on Java Cards by Fingerprinting Applets. In: Reddy, S., Jmaiel, M. (eds.) WETICE, pp. 359\u2013364. IEEE (2013)","DOI":"10.1109\/WETICE.2013.39"},{"key":"2_CR16","unstructured":"Nohl, K.: Rooting SIM Cards. Speak at the Black Hat USA 2013 (2013)"},{"key":"2_CR17","unstructured":"Oracle: Java Card 3 Platform, Runtime Environment Specification, Classic Edition. No. Version 3.0.4, Oracle. Oracle America Inc., Redwood City, September 2011"},{"key":"2_CR18","unstructured":"Oracle: Java Card 3 Platform, Virtual Machine Specification, Classic Edition. No. Version 3.0.4, Oracle. Oracle America Inc., Redwood City (2011)"},{"volume-title":"Smart Card Research and Advanced Applications","year":"2011","key":"2_CR19","unstructured":"Prouff, E. (ed.): CARDIS 2011, vol. 7079. Springer, Heidelberg (2011)"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-31540-4_10","volume-title":"Data and Applications Security and Privacy XXVI","author":"T Razafindralambo","year":"2012","unstructured":"Razafindralambo, T., Bouffard, G., Lanet, J.-L.: A friendly framework for hidding fault enabled virus for java based smartcard. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 122\u2013128. Springer, Heidelberg (2012)"},{"key":"2_CR21","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-642-34135-9_19","volume-title":"Recent Trends in Computer Networks and Distributed Systems Security","author":"T Razafindralambo","year":"2012","unstructured":"Razafindralambo, T., Bouffard, G., Thampi, B.N., Lanet, J.-L.: A dynamic syntax interpretation for java based smart card to mitigate logical attacks. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds.) SNDS 2012. CCIS, vol. 335, pp. 185\u2013194. Springer, Heidelberg (2012)"},{"issue":"2","key":"2_CR22","first-page":"49","volume":"5","author":"A Sere","year":"2011","unstructured":"Sere, A., Iguchi-Cartigny, J., Lanet, J.L.: Evaluation of Countermeasures Against Fault Attacks on Smart Cards. Int. J. Secur. Appl. 5(2), 49\u201361 (2011)","journal-title":"Int. J. Secur. Appl."},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"S\u00e9r\u00e9, A.A.K., Iguchi-Cartigny, J., Lanet, J.L.: Automatic detection of fault attack and countermeasures. In: Serpanos, D.N., Wolf, W. (eds.) WESS. ACM (2009)","DOI":"10.1145\/1631716.1631723"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16763-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T22:58:48Z","timestamp":1676933928000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16763-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319167626","9783319167633"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16763-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}