{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:59:22Z","timestamp":1725551962304},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642125096"},{"type":"electronic","value":"9783642125102"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12510-2_11","type":"book-chapter","created":{"date-parts":[[2010,4,9]],"date-time":"2010-04-09T23:43:16Z","timestamp":1270856596000},"page":"148-163","source":"Crossref","is-referenced-by-count":47,"title":["Attacks on Java Card 3.0 Combining Fault and Logical Attacks"],"prefix":"10.1007","author":[{"given":"Guillaume","family":"Barbu","sequence":"first","affiliation":[]},{"given":"Hugues","family":"Thiebeauld","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Guerin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Allenbach, P.: Java Card 3: Classic Functionality Gets a Connectivity Boost (2009), \n                    \n                      http:\/\/java.sun.com\/developer\/technicalArticles\/javacard\/javacard3\/","key":"11_CR1"},{"unstructured":"Anderson, R., Kuhn, M.: Tamper Resistance \u2013 a Cautionary Note. In: Proceedings of the 2nd USENIX Workshop on Electronic Commerce, pp. 1\u201311. USENIX Association (1996)","key":"11_CR2"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/3-540-36400-5_20","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"C. Aum\u00fcller","year":"2003","unstructured":"Aum\u00fcller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.P.: Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 260\u2013275. Springer, Heidelberg (2003)"},{"unstructured":"Barbu, G.: Fault Attacks on Java Card 3 Virtual Machine. In: e-Smart 2009 (2009)","key":"11_CR4"},{"unstructured":"Bauduin, R.: Fault Attacks, an Intuitive Approach. In: Fault Diagnosis and Tolerance in Cryptography, FDTC 2006 (2006) (invited talk)","key":"11_CR5"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R., Lipton, R.: On the Importance of Checking Cryptographic Protocols for Faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"unstructured":"Common Criteria: Application of Attack Potential to Smartcards - Version 2.7, Rev.1 (2009)","key":"11_CR7"},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/1-4020-8147-2_11","volume-title":"Smart Card Research and Advanced Application Conference (CARDIS 2004)","author":"C. Giraud","year":"2004","unstructured":"Giraud, C., Thiebeauld, H.: A Survey on Fault Attacks. In: Smart Card Research and Advanced Application Conference (CARDIS 2004). LNCS, pp. 159\u2013176. Springer, Heidelberg (2004)"},{"unstructured":"GlobalPlatform Inc.: GlobalPlatform Card Specification 2.1.1. (2003)","key":"11_CR9"},{"unstructured":"GlobalPlatform Inc.: GlobalPlatform Card Specification 2.2. (2006)","key":"11_CR10"},{"doi-asserted-by":"crossref","unstructured":"Govindavajhala, S., Appel, A.: Using Memory Errors to Attack a Virtual Machine. In: IEEE Symposium on Security and Privacy, SP 2003 (2003)","key":"11_CR11","DOI":"10.1109\/SECPRI.2003.1199334"},{"unstructured":"Hypp\u00f6nen, K.: Use of Cryptographic Codes for Bytecode Verification in Smartcard Environment. Master\u2019s thesis, University of Kuopio, Finland (2003)","key":"11_CR12"},{"unstructured":"Iguchi-Cartigny, J., Lanet, J.L.: \u00c9valuation de l\u2019injection de code malicieux dans une Java Card. In: Symposium sur la S\u00e9curit\u00e9 des Technologies de l\u2019Information et de la Communication, SSTIC 2009 (2009)","key":"11_CR13"},{"unstructured":"Kocher, P., Jaffe, J., Jun, B.: Introduction to Differential Power Analysis and Related Attacks. Technical report, Cryptography Research Inc. (1998)","key":"11_CR14"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"11_CR16","volume-title":"The Java Virtual Machine Specification","author":"T. Lindholm","year":"1999","unstructured":"Lindholm, T., Yellin, F.: The Java Virtual Machine Specification, 2nd edn. Addison-Wesley, Reading (1999)","edition":"2"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-85893-5_1","volume-title":"Smart Card Research and Advanced Applications","author":"W. Mostowski","year":"2008","unstructured":"Mostowski, W., Poll, E.: Malicious Code on Java Card Smartcards: Attacks and Countermeasures. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol.\u00a05189, pp. 1\u201316. Springer, Heidelberg (2008)"},{"unstructured":"Sun Microsystems Inc.: Application Programming Interface, Java Card Platform Version 3.0.1 Connected edn. (2009)","key":"11_CR18"},{"unstructured":"Sun Microsystems Inc.: Java Card Portal, \n                    \n                      http:\/\/java.sun.com\/javacard\/","key":"11_CR19"},{"unstructured":"Sun Microsystems Inc.: Runtime Environment Specification, Java Card Platform Version 2.2.2 (2006)","key":"11_CR20"},{"unstructured":"Sun Microsystems Inc.: Runtime Environment Specification, Java Card Platform Version 3.0.1 Connected edn. (2009)","key":"11_CR21"},{"unstructured":"Sun Microsystems Inc.: Virtual Machine Specification, Java Card Platform Version 2.2.2 (2006)","key":"11_CR22"},{"key":"11_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-540-72354-7_12","volume-title":"Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems","author":"D. Vermoen","year":"2007","unstructured":"Vermoen, D., Witteman, M., Gaydadjiev, G.: Reverse Engineering Java Card Applet Using Power Analysis. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol.\u00a04462, pp. 138\u2013149. Springer, Heidelberg (2007)"},{"key":"11_CR24","first-page":"291","volume":"8","author":"M. Witteman","year":"2003","unstructured":"Witteman, M.: Java Card Security. Information Security Bulletin\u00a08, 291\u2013298 (2003)","journal-title":"Information Security Bulletin"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Application"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12510-2_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T11:42:13Z","timestamp":1619782933000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12510-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642125096","9783642125102"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12510-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}