{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T02:59:08Z","timestamp":1725850748602},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319312705"},{"type":"electronic","value":"9783319312712"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31271-2_6","type":"book-chapter","created":{"date-parts":[[2016,3,9]],"date-time":"2016-03-09T13:33:58Z","timestamp":1457530438000},"page":"89-104","source":"Crossref","is-referenced-by-count":2,"title":["Misuse of Frame Creation to Exploit Stack Underflow Attacks on Java Card"],"prefix":"10.1007","author":[{"given":"Benoit","family":"Laugier","sequence":"first","affiliation":[]},{"given":"Tiana","family":"Razafindralambo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,10]]},"reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-12510-2_11","volume-title":"Smart Card Research and Advanced Application","author":"G Barbu","year":"2010","unstructured":"Barbu, G., Thiebeauld, H., Guerin, V.: Attacks on java card 3.0 combining fault and logical attacks. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 148\u2013163. Springer, Heidelberg (2010)"},{"key":"6_CR2","unstructured":"Bouffard, G.: A Generic Approach for Protecting Java Card Smart Card Against Software Attacks. PhD thesis, Universit\u00e9 de Limoges (2014)"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-642-27257-8_18","volume-title":"Smart Card Research and Advanced Applications","author":"G Bouffard","year":"2011","unstructured":"Bouffard, G., Iguchi-Cartigny, J., Lanet, J.-L.: Combined software and hardware attacks on the java card control flow. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol. 7079, pp. 283\u2013296. Springer, Heidelberg (2011)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Bouffard, G., Khefif, T., Kane, I., Salvia, S.C.: Accessing Secure Information using Export file Fraudulence. In: CRiSIS, pp. 1\u20135, La Rochelle, France, October 2013","DOI":"10.1109\/CRiSIS.2013.6766346"},{"key":"6_CR5","unstructured":"Calafato, A.: An analysis of the vulnerabilities introduced with java card 3 connected edition (2013)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Faugeron, E.: Manipulate frame information with an underflow attack undetected by the off-card verifie (2013)","DOI":"10.1007\/978-3-319-08302-5_10"},{"key":"6_CR7","unstructured":"Hubbers, E., Poll, E.: Transactions and non-atomic api calls in java card: specification ambiguity and strange implementation behaviours. Radboud University Nijmegen, Department of Computer Science NIII-R0438 (2004)"},{"issue":"4","key":"6_CR8","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s11416-009-0135-3","volume":"6","author":"J Iguchi-Cartigny","year":"2010","unstructured":"Iguchi-Cartigny, J., Lanet, J.-L.: Developing a trojan applets in a smart card. J. Comput. Virol. 6(4), 343\u2013351 (2010)","journal-title":"J. Comput. Virol."},{"key":"6_CR9","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"Paul Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener [17], pp. 388\u2013397"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-37288-9_1","volume-title":"Smart Card Research and Advanced Applications","author":"M Lackner","year":"2013","unstructured":"Lackner, M., Berlach, R., Loinig, J., Weiss, R., Steger, C.: Towards the hardware accelerated defensive virtual machine \u2013 type and bound protection. In: Mangard, S. (ed.) CARDIS 2012. LNCS, vol. 7771, pp. 1\u201315. Springer, Heidelberg (2013)"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-85893-5_1","volume-title":"Smart Card Research and Advanced Applications","author":"W Mostowski","year":"2008","unstructured":"Mostowski, W., Poll, E.: Malicious code on java card smartcards: attacks and countermeasures. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 1\u201316. Springer, Heidelberg (2008)"},{"key":"6_CR12","unstructured":"Nohl, K.: Rooting sim cards (2013)"},{"key":"6_CR13","unstructured":"The Last Stage of Delirium Research Group: Java and java virtual machine security vulnerabilities and their exploitation techniques (2002)"},{"issue":"2","key":"6_CR14","first-page":"49","volume":"5","author":"AA Sere","year":"2011","unstructured":"Sere, A.A., Iguchi-Cartigny, J., Lanet, J.-L.: Evaluation of countermeasures against fault attacks on smart cards. Int. J. Secur. Appl. 5(2), 49\u201361 (2011)","journal-title":"Int. J. Secur. Appl."},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-36400-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"SP Skorobogatov","year":"2003","unstructured":"Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 2\u201312. Springer, Heidelberg (2003)"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-642-12510-2_10","volume-title":"Smart Card Research and Advanced Application","author":"E Vetillard","year":"2010","unstructured":"Vetillard, E., Ferrari, A.: Combined attacks and countermeasures. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 133\u2013147. Springer, Heidelberg (2010)"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Wiener, M.J. (ed.) 19th Annual International Cryptology Conference\u2014Advances in Cryptology - CRYPTO 1999, Santa Barbara, California, USA, August 15\u201319. Lecture Notes in Computer Science, vol. 1666. Springer, Heidelberg (1999)","DOI":"10.1007\/3-540-48405-1"},{"key":"6_CR18","first-page":"11","volume":"7","author":"M Witteman","year":"2002","unstructured":"Witteman, M.: Advances in smartcard security. Inf. Secur. Bull. 7, 11\u201322 (2002)","journal-title":"Inf. Secur. Bull."}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31271-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T17:59:52Z","timestamp":1559411992000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31271-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319312705","9783319312712"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31271-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}