{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T02:59:08Z","timestamp":1725850748006},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319312705"},{"type":"electronic","value":"9783319312712"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31271-2_5","type":"book-chapter","created":{"date-parts":[[2016,3,9]],"date-time":"2016-03-09T13:33:58Z","timestamp":1457530438000},"page":"75-88","source":"Crossref","is-referenced-by-count":7,"title":["Java Card Virtual Machine Compromising from a Bytecode Verified Applet"],"prefix":"10.1007","author":[{"given":"Julien","family":"Lancia","sequence":"first","affiliation":[]},{"given":"Guillaume","family":"Bouffard","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,10]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/978-3-642-27257-8_19","volume-title":"Smart Card Research and Advanced Applications","author":"Guillaume Barbu","year":"2011","unstructured":"Barbu, G., Duc, G., Hoogvorst, P.: Java card operand stack: fault attacks, combined attacks and countermeasures. In: Prouff, E. (ed.) [21], pp. 297\u2013313 (2011)"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-12510-2_11","volume-title":"Smart Card Research and Advanced Application","author":"G Barbu","year":"2010","unstructured":"Barbu, G., Thiebeauld, H., Guerin, V.: Attacks on java card 3.0 combining fault and logical attacks. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 148\u2013163. Springer, Heidelberg (2010)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Berlach, R., Lackner, M., Steger, C., Loinig, J., Haselsteiner, E.: Memory-efficient on-card byte code verification for Java cards. In: Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2 2014, pp. 37\u201340. ACM, New York (2014)","DOI":"10.1145\/2556315.2556323"},{"key":"5_CR4","unstructured":"Bouffard, G.: A generic approach for protecting Java card smart card against software attacks. Ph.D. thesis, University of Limoges, Limoges, France, October 2014"},{"key":"5_CR5","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/978-3-642-27257-8_18","volume-title":"Smart Card Research and Advanced Applications","author":"Guillaume Bouffard","year":"2011","unstructured":"Bouffard, G., Iguchi-Cartigny, J., Lanet, J.: Combined software and hardware attacks on the java card control flow. In: Prouff, E. (ed.) [21], pp. 283\u2013296"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.cose.2015.01.004","volume":"50","author":"G Bouffard","year":"2015","unstructured":"Bouffard, G., Lanet, J.: The ultimate control flow transfer in a Java based smart card. Comput. Secur. 50, 33\u201346 (2015)","journal-title":"Comput. Secur."},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Calvagna, A., Fornaia, A., Tramontana, E.: Combinatorial interaction testing of a Java card static verifier. In: 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation, Workshops Proceedings, March 31 - April 4, 2014, Cleveland, Ohio, USA, pp. 84\u201387. IEEE Computer Society (2014)","DOI":"10.1109\/ICSTW.2014.10"},{"key":"5_CR8","unstructured":"Calvagna, A., Tramontana, E.: Automated conformance testing of Java virtual machines. In: Barolli, L., Xhafa, F., Chen, H., G\u00f3mez-Skarmeta, A.F., Hussain, F. (eds.) Seventh International Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2013, Taichung, Taiwan, July 3\u20135, 2013, pp. 547\u2013552. IEEE Computer Society (2013)"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/3-540-45614-7_17","volume-title":"FME 2002: Formal Methods - Getting IT Right","author":"L Casset","year":"2002","unstructured":"Casset, L.: Development of an embedded verifier for Java card byte code using formal methods. In: Eriksson, L.-H., Lindsay, P.A. (eds.) FME 2002. LNCS, vol. 2391, pp. 290\u2013309. Springer, Heidelberg (2002)"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1007\/978-3-319-14123-7_10","volume-title":"Smart Card Research and Advanced Applications","author":"E Faugeron","year":"2014","unstructured":"Faugeron, E.: Manipulating the frame information with an underflow attack. In: Francillon, A., Rohatgi, P. (eds.) CARDIS 2013. LNCS, vol. 8419, pp. 140\u2013151. Springer, Heidelberg (2014)"},{"key":"5_CR11","unstructured":"Faugeron, E., Valette, S.: How to hoax an off-card verifier. e-smart (2010)"},{"key":"5_CR12","unstructured":"Hamadouche, S.: \u00c9tude de la s\u00e9curit\u00e9 dun v\u00e9rifieur de Byte Code et g\u00e9n\u00e9ration de tests de vuln\u00e9rabilit\u00e9. Master\u2019s thesis, University M\u2019Hamed Bougara of Boumerdes, Faculty of Sciences, LIMOSE Laboratory, 5 Avenue de l\u2019indpendance, 35000 Boumerdes, Algeria (2012)"},{"key":"5_CR13","unstructured":"Hamadouche, S., Bouffard, G., Lanet, J.L., Dorsemaine, B., Nouhant, B., Magloire, A., Reygnaud, A.: Subverting byte code linker service to characterize Java card API. In: Seventh Conference on Network and Information Systems Security (SAR-SSI), pp. 75\u201381, May 22rd to 25th 2012"},{"issue":"2\u20133","key":"5_CR14","first-page":"130","volume":"18","author":"S Hamadouche","year":"2013","unstructured":"Hamadouche, S., Lanet, J.: Virus in a smart card: myth or reality? J. Inf. Secur. Appl. 18(2\u20133), 130\u2013137 (2013)","journal-title":"J. Inf. Secur. Appl."},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-642-37288-9_3","volume-title":"Smart Card Research and Advanced Applications","author":"J Lancia","year":"2013","unstructured":"Lancia, J.: Java card combined attacks with localization-agnostic fault injection. In: Mangard, S. (ed.) CARDIS 2012. LNCS, vol. 7771, pp. 31\u201345. Springer, Heidelberg (2013)"},{"issue":"4","key":"5_CR16","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1002\/spe.438","volume":"32","author":"X Leroy","year":"2002","unstructured":"Leroy, X.: Bytecode verification on Java smart cards. Softw. Pract. Exper. 32(4), 319\u2013340 (2002)","journal-title":"Softw. Pract. Exper."},{"key":"5_CR17","volume-title":"The Java Native Interface: Programmer\u2019s Guide and Specification","author":"S Liang","year":"1999","unstructured":"Liang, S.: The Java Native Interface: Programmer\u2019s Guide and Specification, 1st edn. Addison-Wesley Professional, Reading (1999)","edition":"1"},{"key":"5_CR18","volume-title":"The Java Virtual Machine Specification: Java Series","author":"T Lindholm","year":"2014","unstructured":"Lindholm, T., Yellin, F., Bracha, G., Buckley, A.: The Java Virtual Machine Specification: Java Series. Addison-Wesley, Reading (2014)"},{"key":"5_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-85893-5_1","volume-title":"Smart Card Research and Advanced Applications","author":"W Mostowski","year":"2008","unstructured":"Mostowski, W., Poll, E.: Malicious code on java card smartcards: attacks and countermeasures. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 1\u201316. Springer, Heidelberg (2008)"},{"key":"5_CR20","unstructured":"Oracle: Java Card 3 Platform, Virtual Machine Specification, Classic Edition. No. Version 3.0.5, Oracle, Oracle America Inc, 500 Oracle Parkway, Redwood City, CA 94065 (2015)"},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","volume-title":"Smart Card Research and Advanced Applications","year":"2011","unstructured":"Prouff, E. (ed.): CARDIS 2011. LNCS, vol. 7079. Springer, Heidelberg (2011)"},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-31540-4_10","volume-title":"Data and Applications Security and Privacy XXVI","author":"T Razafindralambo","year":"2012","unstructured":"Razafindralambo, T., Bouffard, G., Lanet, J.-L.: A friendly framework for hidding fault enabled virus for Java based smartcard. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 122\u2013128. Springer, Heidelberg (2012)"},{"key":"5_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-642-38613-8_16","volume-title":"Integrated Formal Methods","author":"A Savary","year":"2013","unstructured":"Savary, A., Frappier, M., Lanet, J.-L.: Detecting vulnerabilities in Java-card bytecode verifiers using model-based testing. In: Johnsen, E.B., Petre, L. (eds.) IFM 2013. LNCS, vol. 7940, pp. 223\u2013237. Springer, Heidelberg (2013)"},{"key":"5_CR24","unstructured":"Sirer, E.G.: Testing Java virtual machines. In: International Conference on Software Testing and Review, San Jose, California, November 1999"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31271-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:04:22Z","timestamp":1559412262000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31271-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319312705","9783319312712"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31271-2_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}