{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:59:17Z","timestamp":1725551957345},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642125096"},{"type":"electronic","value":"9783642125102"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12510-2_10","type":"book-chapter","created":{"date-parts":[[2010,4,9]],"date-time":"2010-04-09T23:43:16Z","timestamp":1270856596000},"page":"133-147","source":"Crossref","is-referenced-by-count":33,"title":["Combined Attacks and Countermeasures"],"prefix":"10.1007","author":[{"given":"Eric","family":"Vetillard","sequence":"first","affiliation":[]},{"given":"Anthony","family":"Ferrari","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Barbu, G.: Fault attacks on a java card 3.0 virtual machine"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/978-3-540-75336-0_2","volume-title":"Trustworthy Global Computing","author":"G. Barthe","year":"2007","unstructured":"Barthe, G., Beringer, L., Cr\u00e9gut, P., Gr\u00e9goire, B., Hofmann, M., M\u00fcller, P., Poll, E., Puebla, G., Stark, I., V\u00e9tillard, E.: Mobius: Mobility, ubiquity, security. In: Montanari, U., Sannella, D., Bruni, R. (eds.) TGC 2006. LNCS, vol.\u00a04661, pp. 10\u201329. Springer, Heidelberg (2007)"},{"key":"10_CR3","unstructured":"Chaumette, S., Hatchondo, I., Sauveron, D.: Jcat: An environment for attack and test on java card&trade. In: Proceedings of CCCT 2003 and 9th ISAS 2003, vol.\u00a01, pp. 270\u2013275 (2003)"},{"key":"10_CR4","volume-title":"Proceedings of 3rd Int\u2019l Workshop on Security, Privacy and Trust in Ubiquitous Computing (SecPerU 2007)","author":"N. Dragoni","year":"2007","unstructured":"Dragoni, N., Massacci, F., Schaefer, C., Walter, T., V\u00e9tillard, E.: A security-by-contracts architecture for pervasive services. In: Proceedings of 3rd Int\u2019l Workshop on Security, Privacy and Trust in Ubiquitous Computing (SecPerU 2007). IEEE Press, Los Alamitos (2007)"},{"key":"10_CR5","unstructured":"ITSEC Joint Interpretation Library (JIL). Version 2.7. Application of Attack Potential to Smartcards (February 2009)"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Lanet, J.-L., Iguchi-Cartigny, J.: Developing a trojan applet in a smart card. Journal in Computer Virology\u00a06(1) (2009)","DOI":"10.1007\/s11416-009-0135-3"},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1002\/spe.438","volume":"32","author":"X. Leroy","year":"2002","unstructured":"Leroy, X.: Bytecode verification for java smart card. Software Practice & Experience\u00a032, 319\u2013340 (2002)","journal-title":"Software Practice & Experience"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-85893-5_1","volume-title":"Smart Card Research and Advanced Applications","author":"W. Mostowski","year":"2008","unstructured":"Mostowski, W., Poll, E.: Malicious code on java card smartcards: Attacks and countermeasures. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol.\u00a05189, pp. 1\u201316. Springer, Heidelberg (2008)"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-540-72354-7_12","volume-title":"Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems","author":"D. Vermoen","year":"2007","unstructured":"Vermoen, D., Witteman, M.F., Gaydadjiev, G.: Reverse engineering java card applets using power analysis. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol.\u00a04462, pp. 138\u2013149. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Application"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12510-2_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:54:35Z","timestamp":1606186475000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12510-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642125096","9783642125102"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12510-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}