{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:38:40Z","timestamp":1725867520314},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319472379"},{"type":"electronic","value":"9783319472386"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47238-6_3","type":"book-chapter","created":{"date-parts":[[2016,10,4]],"date-time":"2016-10-04T14:36:56Z","timestamp":1475591816000},"page":"40-62","source":"Crossref","is-referenced-by-count":1,"title":["Paper Tigers: An Endless Fight"],"prefix":"10.1007","author":[{"given":"Mozhdeh","family":"Farhadi","sequence":"first","affiliation":[]},{"given":"Jean-Louis","family":"Lanet","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,5]]},"reference":[{"key":"3_CR1","volume-title":"Smart Card Handbook","author":"W Rankl","year":"2004","unstructured":"Rankl, W., Effing, W.: Smart Card Handbook. Wiley, Hoboken (2004)"},{"key":"3_CR2","unstructured":"Oracle: Java Card Platform Specification. http:\/\/java.sun.com\/javacard\/specs.html"},{"key":"3_CR3","unstructured":"Sun Microsystems, Java Card Platform Security, Technical White Paper, October 2001"},{"key":"3_CR4","unstructured":"Hubbers, E., Poll, E.: Transactions and non-atomic API calls in Java Card: specification ambiguity and strange implementation behaviors. Department of Computer Science NIII-R0438, Radboud University Nijmegen (2004)"},{"key":"3_CR5","first-page":"291","volume":"8","author":"M Witteman","year":"2003","unstructured":"Witteman, M.: Java Card security. Inf. Secur. Bull. 8, 291\u2013298 (2003)","journal-title":"Inf. Secur. Bull."},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-85893-5_1","volume-title":"Smart Card Research and Advanced Applications","author":"W Mostowski","year":"2008","unstructured":"Mostowski, W., Poll, E.: Malicious code on Java Card smartcards: attacks and countermeasures. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 1\u201316. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-85893-5_1"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Bouffard, G., Khefif, T., Lanet, J.-L., Kane, I., Salvia, S.C.: Accessing secure information using export file fraudulence. In: CRiSIS, pp. 1\u20135 (2013)","DOI":"10.1109\/CRiSIS.2013.6766346"},{"key":"3_CR8","unstructured":"Noubissi, A., S\u00e9r\u00e9, A., Iguchi-Cartigny, J., Lanet, J.-L., Bouffard, G., Boutet, J.: Cartes puce: attaques et contremesures. In: MajecSTIC 16.1112 (2009)"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-642-27257-8_18","volume-title":"Smart Card Research and Advanced Applications","author":"G Bouffard","year":"2011","unstructured":"Bouffard, G., Iguchi-Cartigny, J., Lanet, J.-L.: Combined software and hardware attacks on the Java Card control flow. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol. 7079, pp. 283\u2013296. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-27257-8_18"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-319-08302-5_10","volume-title":"Smart Card Research and Advanced Applications","author":"E Faugeron","year":"2014","unstructured":"Faugeron, E.: Manipulating the frame information with an underflow attack. In: Francillon, A., Rohatgi, P. (eds.) CARDIS 2013. LNCS, vol. 8419, pp. 140\u2013151. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-08302-5_10"},{"issue":"2015","key":"3_CR11","doi-asserted-by":"publisher","first-page":"3346","DOI":"10.1016\/j.cose. 01.004","volume":"50","author":"G Bouffard","year":"2015","unstructured":"Bouffard, G., Lanet, J.-L.: The ultimate control flow transfer in a Java based smart card. Comput. Secur. 50(2015), 3346 (2015). doi: 10.1016\/j.cose. 01.004","journal-title":"Comput. Secur."},{"key":"3_CR12","doi-asserted-by":"publisher","unstructured":"Farhadi, M. , Lanet, J.L.: Chronicle of Java Card death. J. Comput. Virol. Hacking Tech. 1\u201315 (2016). doi: 10.1007\/s11416-016-0276-0","DOI":"10.1007\/s11416-016-0276-0"},{"key":"3_CR13","unstructured":"Hamadouche, S., Bouffard, G., Lanet, J.-L., Dorsemaine, B., Nouhant, B., Magloire, A., Reygnaud, A.: Subverting byte code linker service to characterize Java Card API. In: Seventh Conference on Network and Information Systems Security (SAR-SSI), pp. 75\u201381 (2012)"},{"key":"3_CR14","unstructured":"Dubreuil J.: Java Card security, software and combined attacks. In: SSTIC (2016)"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Lancia, J., Bouffard, G.: Java Card virtual machine compromising from a byte code verified applet. In: 14th CARDIS, Bochum, pp. 75\u201388 (2015)","DOI":"10.1007\/978-3-319-31271-2_5"},{"key":"3_CR16","unstructured":"Lancia, J., Bouffard, G.: Fuzzing and overflows in Java Card smart cards. In: SSTIC Conference, Rennes, France, June 2016"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-319-31271-2_6","volume-title":"Smart Card Research and Advanced Applications","author":"B Laugier","year":"2016","unstructured":"Laugier, B., Razafindralambo, T.: Misuse of frame creation to exploit stack underflow attacks on Java Card. In: Homma, N., Medwed, M. (eds.) CARDIS 2015. LNCS, vol. 9514, pp. 89\u2013104. Springer, Heidelberg (2016). doi: 10.1007\/978-3-319-31271-2_6"},{"issue":"12","key":"3_CR18","first-page":"21","volume":"24","author":"B Schneier","year":"1999","unstructured":"Schneier, B.: Attack trees. Dr. Dobb J. 24(12), 21\u201329 (1999)","journal-title":"Dr. Dobb J."},{"key":"3_CR19","unstructured":"Common Criteria, Common Criteria for Information Technology Security Evaluation, version 3.1, July 2009"}],"container-title":["Lecture Notes in Computer Science","Innovative Security Solutions for Information Technology and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47238-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T03:51:57Z","timestamp":1568433117000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47238-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319472379","9783319472386"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47238-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}