{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:57:44Z","timestamp":1742993864052,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319186801"},{"type":"electronic","value":"9783319186818"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18681-8_12","type":"book-chapter","created":{"date-parts":[[2015,5,6]],"date-time":"2015-05-06T13:17:19Z","timestamp":1430918239000},"page":"149-161","source":"Crossref","is-referenced-by-count":0,"title":["Countermeasures Mitigation for Designing Rich Shell Code in Java Card"],"prefix":"10.1007","author":[{"given":"Noreddine","family":"El Janati El Idrissi","sequence":"first","affiliation":[]},{"given":"Said","family":"El Hajji","sequence":"additional","affiliation":[]},{"given":"Jean-Louis","family":"Lanet","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Barbu, G., Duc, G., Hoogvorst, P.: Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures. In: Prouff [15], pp. 297\u2013313","DOI":"10.1007\/978-3-642-27257-8_19"},{"key":"12_CR2","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-30436-1_4","volume-title":"Information Security and Privacy Research","author":"G. Barbu","year":"2012","unstructured":"Barbu, G., Giraud, C., Guerin, V.: Embedded Eavesdropping on Java Card. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol.\u00a0376, pp. 37\u201348. Springer, Heidelberg (2012)"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-28166-2_1","volume-title":"Engineering Secure Software and Systems","author":"G. Barbu","year":"2012","unstructured":"Barbu, G., Hoogvorst, P., Duc, G.: Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused. In: Barthe, G., Livshits, B., Scandariato, R. (eds.) ESSoS 2012. LNCS, vol.\u00a07159, pp. 1\u201313. Springer, Heidelberg (2012)"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-12510-2_11","volume-title":"Smart Card Research and Advanced Application","author":"G. Barbu","year":"2010","unstructured":"Barbu, G., Thiebeauld, H., Guerin, V.: Attacks on Java Card 3.0 Combining Fault and Logical Attacks. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol.\u00a06035, pp. 148\u2013163. Springer, Heidelberg (2010)"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-642-27257-8_18","volume-title":"Smart Card Research and Advanced Applications","author":"G. Bouffard","year":"2011","unstructured":"Bouffard, G., Iguchi-Cartigny, J., Lanet, J.L.: Combined Software and Hardware Attacks on the Java Card Control Flow. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol.\u00a07079, pp. 283\u2013296. Springer, Heidelberg (2011)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Bouffard, G., Iguchi-Cartigny, J., Lanet, J.L.: Combined Software and Hardware Attacks on the Java Card Control Flow. In: Prouff [15], pp. 283\u2013296","DOI":"10.1007\/978-3-642-27257-8_18"},{"issue":"4","key":"12_CR7","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s11416-014-0218-7","volume":"10","author":"G. Bouffard","year":"2014","unstructured":"Bouffard, G., Lanet, J.L.: Reversing the operating system of a java based smart card. Journal of Computer Virology and Hacking Techniques\u00a010(4), 239\u2013253 (2014), \n                        http:\/\/dx.doi.org\/10.1007\/s11416-014-0218-7","journal-title":"Journal of Computer Virology and Hacking Techniques"},{"key":"12_CR8","unstructured":"Carlier, V., Chabanne, H., Dottax, E., Pelletier, H.: Electromagnetic Side Channels of an FPGA Implementation of AES. IACR Cryptology ePrint Archive 2004, 145 (2004)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Faugeron, E.: Manipulating the frame information with an underflow attack. In: Francillon and Rohatgi [15], pp. 140\u2013151","DOI":"10.1007\/978-3-319-14123-7_10"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","volume-title":"Smart Card Research and Advanced Applications","year":"2014","unstructured":"Francillon, A., Rohatgi, P. (eds.): CARDIS 2013. LNCS, vol.\u00a08419. Springer, Heidelberg (2014)"},{"key":"12_CR11","unstructured":"GlobalPlatform: Card Specification. GlobalPlatform Inc., 2.2.1 edn. (January 2011)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Hamadouche, S., Lanet, J.L.: Virus in a smart card: Myth or reality? In: Cheng, L., Wong, K. (eds.) Journal of Information Security and Applications, vol.\u00a018(2-3), pp. 130\u2013137. Elsevier (2013)","DOI":"10.1016\/j.jisa.2013.08.005"},{"issue":"4","key":"12_CR13","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s11416-009-0135-3","volume":"6","author":"J. Iguchi-Cartigny","year":"2010","unstructured":"Iguchi-Cartigny, J., Lanet, J.L.: Developing a Trojan applets in a smart card. Journal in Computer Virology\u00a06(4), 343\u2013351 (2010)","journal-title":"Journal in Computer Virology"},{"key":"12_CR14","unstructured":"Oracle: Java Card 3 Platform, Virtual Machine Specification, Classic Edition. No. Version 3.0.4, Oracle, Oracle America, Inc., 500 Oracle Parkway, Redwood City, CA 94065 (2011)"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","volume-title":"Smart Card Research and Advanced Applications","year":"2011","unstructured":"Prouff, E. (ed.): CARDIS 2011. LNCS, vol.\u00a07079. Springer, Heidelberg (2011)"},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-31540-4_10","volume-title":"Data and Applications Security and Privacy XXVI","author":"T. Razafindralambo","year":"2012","unstructured":"Razafindralambo, T., Bouffard, G., Lanet, J.-L.: A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol.\u00a07371, pp. 122\u2013128. Springer, Heidelberg (2012)"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-540-72354-7_12","volume-title":"Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems","author":"D. Vermoen","year":"2007","unstructured":"Vermoen, D., Witteman, M.F., Gaydadjiev, G.: Reverse Engineering Java Card Applets Using Power Analysis. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol.\u00a04462, pp. 138\u2013149. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Codes, Cryptology, and Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18681-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,16]],"date-time":"2023-02-16T21:47:59Z","timestamp":1676584079000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-18681-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319186801","9783319186818"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18681-8_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}