{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T16:59:52Z","timestamp":1725641992787},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642272561"},{"type":"electronic","value":"9783642272578"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-27257-8_1","type":"book-chapter","created":{"date-parts":[[2011,12,12]],"date-time":"2011-12-12T00:50:42Z","timestamp":1323651042000},"page":"1-17","source":"Crossref","is-referenced-by-count":5,"title":["Evaluation of the Ability to Transform SIM Applications into Hostile Applications"],"prefix":"10.1007","author":[{"given":"Guillaume","family":"Bouffard","sequence":"first","affiliation":[]},{"given":"Jean-Louis","family":"Lanet","sequence":"additional","affiliation":[]},{"given":"Jean-Baptiste","family":"Machemie","sequence":"additional","affiliation":[]},{"given":"Jean-Yves","family":"Poichotte","sequence":"additional","affiliation":[]},{"given":"Jean-Philippe","family":"Wary","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., Erlingsson, M.B.U., Ligatti, J.: Control-flow integrity. In: CCS 2005: Proceedings of the 12th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, November 7-11, p. 340. Citeseer (2005)","DOI":"10.1145\/1102120.1102165"},{"key":"1_CR2","unstructured":"Akkar, M.L., Goubin, L., Ly, O.: Automatic integration of counter-measures against fault injection attacks. Pre-print found (2003), \n                    \n                      http:\/\/www.labri.fr\/Perso\/ly\/index.htm"},{"key":"1_CR3","unstructured":"ANSSI. Protection Profile (U)SIM Java Card Platform Protection Profile - Basic Configuration, ANSSI-CC-PP-2010\/04 12\/07\/2010. ANSSI (2010)"},{"key":"1_CR4","unstructured":"ANSSI. Protection Profile (U)SIM Java Card Platform Protection Profile - SCWS Configuration, ANSSI-CC-PP-2010\/05, 12\/07\/2010. ANSSI (2010)"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/3-540-36400-5_20","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"C. Aumuller","year":"2003","unstructured":"Aumuller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.P.: Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 260\u2013275. Springer, Heidelberg (2003)"},{"issue":"2","key":"1_CR6","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/JPROC.2005.862424","volume":"94","author":"H. Bar-El","year":"2006","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer\u2019s apprentice guide to fault attacks. Proceedings of the IEEE\u00a094(2), 370\u2013382 (2006)","journal-title":"Proceedings of the IEEE"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-12510-2_11","volume-title":"Smart Card Research and Advanced Application","author":"G. Barbu","year":"2010","unstructured":"Barbu, G., Thiebeauld, H., Guerin, V.: Attacks on Java Card 3.0 Combining Fault and Logical Attacks. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol.\u00a06035, pp. 148\u2013163. Springer, Heidelberg (2010)"},{"key":"1_CR8","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1145\/948109.948151","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security","author":"J. Blomer","year":"2003","unstructured":"Blomer, J., Otto, M., Seifert, J.P.: A new CRT-RSA algorithm secure against Bellcore attacks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 311\u2013320. ACM, New York (2003)"},{"key":"1_CR9","series-title":"LNCS","first-page":"283","volume-title":"CARDIS 2011","author":"G. Bouffard","year":"2011","unstructured":"Bouffard, G., Cartigny, J., Lanet, J.-L.: Combined Software and Hardware Attacks on the Java Card Control Flow. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol.\u00a07079, pp. 283\u2013296. Springer, Heidelberg (2011)"},{"key":"1_CR10","unstructured":"ETSI. 3GPP TS 31.102, Technical Specification Group Core Network and Terminals. ETSI (2005)"},{"key":"1_CR11","unstructured":"Gadella, K.: Fault Attacks on Java Card (Masters Thesis). Master thesis, Universidade de Eindhoven (2005)"},{"key":"1_CR12","unstructured":"GP. Global platform official site (2010)"},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-540-28632-5_19","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"L. Hemme","year":"2004","unstructured":"Hemme, L.: A Differential Fault Attack Against Early Rounds of (Triple-)DES. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 254\u2013267. Springer, Heidelberg (2004)"},{"issue":"4","key":"1_CR14","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s11416-009-0135-3","volume":"6","author":"J. Iguchi-Cartigny","year":"2010","unstructured":"Iguchi-Cartigny, J., Lanet, J.L.: Developing a trojan applet in a smart card. Journal in Computer Virology\u00a06(4), 343\u2013351 (2010)","journal-title":"Journal in Computer Virology"},{"issue":"1","key":"1_CR15","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1109\/24.994926","volume":"51","author":"N. Oh","year":"2002","unstructured":"Oh, N., Shirvani, P.P., McCluskey, E.J., et al.: Control-flow checking by software signatures. IEEE Transactions on Reliability\u00a051(1), 111\u2013122 (2002)","journal-title":"IEEE Transactions on Reliability"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-540-45238-6_7","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"G. Piret","year":"2003","unstructured":"Piret, G., Quisquater, J.-J.: A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 77\u201388. Springer, Heidelberg (2003)"},{"key":"1_CR17","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1109\/CGO.2005.34","volume-title":"Proceedings of the International Symposium on Code Generation and Optimization","author":"G.A. Reis","year":"2005","unstructured":"Reis, G.A., Chang, J., Vachharajani, N., Rangan, R., August, D.I.: Swift: Software implemented fault tolerance. In: Proceedings of the International Symposium on Code Generation and Optimization, pp. 243\u2013254. IEEE Computer Society, Washington, DC, USA (2005)"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Scott, K., Davidson, J.: Safe virtual execution using software dynamic translation. In: Proceedings of the 18th Annual Computer Security Applications Conference, p. 209. Citeseer (2002)","DOI":"10.1109\/CSAC.2002.1176292"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Sere, A.A., Iguchi-Cartigny, J., Lanet, J.-L.: Automatic detection of fault attack and countermeasures. In: Proceedings of the 4th Workshop on Embedded Systems Security, pp. 1\u20137. ACM (2009)","DOI":"10.1145\/1631716.1631723"},{"key":"1_CR20","unstructured":"Sere, A.A., Iguchi-Cartigny, J., Lanet, J.-L.: A path check detection mechanism for embedded systems. In: Proceedings of SecTech 2010, vol.\u00a06485, pp. 459\u2013469 (2010)"},{"key":"1_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-36400-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S.P. Skorobogatov","year":"2003","unstructured":"Skorobogatov, S.P., Anderson, R.J.: Optical Fault Induction Attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 2\u201312. Springer, Heidelberg (2003)"},{"key":"1_CR22","unstructured":"SunMicrosystems. Java Card 3.0.1 Specification. Sun Microsystems (2009)"},{"key":"1_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-642-12510-2_10","volume-title":"Smart Card Research and Advanced Application","author":"E. Vetillard","year":"2010","unstructured":"Vetillard, E., Ferrari, A.: Combined Attacks and Countermeasures. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol.\u00a06035, pp. 133\u2013147. Springer, Heidelberg (2010)"},{"key":"1_CR24","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1145\/1030083.1030097","volume-title":"Proceedings of the 11th ACM Conference on Computer and Communications Security","author":"D. Wagner","year":"2004","unstructured":"Wagner, D.: Cryptanalysis of a provably secure crt-rsa algorithm. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 92\u201397. ACM, New York (2004)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27257-8_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:59:14Z","timestamp":1606186754000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27257-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642272561","9783642272578"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27257-8_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}