{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T16:59:48Z","timestamp":1725641988699},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642272561"},{"type":"electronic","value":"9783642272578"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-27257-8_2","type":"book-chapter","created":{"date-parts":[[2011,12,11]],"date-time":"2011-12-11T19:50:42Z","timestamp":1323633042000},"page":"18-33","source":"Crossref","is-referenced-by-count":4,"title":["Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.0 -"],"prefix":"10.1007","author":[{"given":"Guillaume","family":"Barbu","sequence":"first","affiliation":[]},{"given":"Hugues","family":"Thiebeauld","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Sun Microsystems Inc.: Runtime Environment Specification, Java Card Platform Version 3.0.1 Connected Edition (2009)"},{"key":"2_CR2","unstructured":"Sun Microsystems Inc.: Java Servlet Specification, Java Card Platform Version 3.0.1 Connected Edition (2009)"},{"key":"2_CR3","unstructured":"Sun Microsystems Inc.: Virtual Machine Specification, Java Card Platfokrm Version 3.0.1 Connected Edition (2009)"},{"key":"2_CR4","unstructured":"Anderson, R., Kuhn, M.: Tamper Resistance \u2013 a Cautionary Note. In: 2nd USENIX Workwhop on Electronic Commerce"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R., Lipton, R.: On the Importance of Checking Cryptographic Protocols for Faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"key":"2_CR6","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/1-4020-8147-2_11","volume-title":"Smart Card Research and Advanced Application Conference (CARDIS 2004)","author":"C. Giraud","year":"2004","unstructured":"Giraud, C., Thiebeauld, H.: A Survey on Fault Attacks. In: Smart Card Research and Advanced Application Conference (CARDIS 2004). LNCS, pp. 159\u2013176. Springer, Heidelberg (2004)"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Govindavajhala, S., Appel, A.W.: Using Memory Errors to Attack a Virtual Machine. In: SP 2003: Proceedings of the 2003 IEEE Symposium on Security and Privacy, Washington, DC, p. 154 (2003)","DOI":"10.1109\/SECPRI.2003.1199334"},{"key":"2_CR8","unstructured":"GlobalPlatform Inc.: GlobalPlatform Card Specification 2.2 (2006)"},{"key":"2_CR9","unstructured":"Lindholm, T., Yellin, F.: The Java Virtual Machine Specification, 2nd edn. Addison-Wesley (1999)"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-12510-2_11","volume-title":"Smart Card Research and Advanced Application","author":"G. Barbu","year":"2010","unstructured":"Barbu, G., Thiebeauld, H., Guerin, V.: Attacks on Java Card 3.0 Combining Fault and Logical Attacks. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol.\u00a06035, pp. 148\u2013163. Springer, Heidelberg (2010)"},{"key":"2_CR11","unstructured":"Hogenboom, J., Mostowski, W.: Full memory read attack on a java card. In: 4th Benelux Workshop on Information and System Security Proceedings, WISSEC 2009 (2009)"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Handley, M., Rescorla, E.: RFC 4732: Internet Denial-of-Service Considerations (2006)","DOI":"10.17487\/rfc4732"},{"key":"2_CR13","unstructured":"CERT Coordination Center: Denial of Service Attacks. Technical report (1997), http:\/\/www.cert.org\/tech_tips\/denial_of_service.html"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-540-72354-7_12","volume-title":"Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems","author":"D. Vermoen","year":"2007","unstructured":"Vermoen, D., Witteman, M., Gaydadjiev, G.N.: Reverse Engineering Java Card Applets Using Power Analysis. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol.\u00a04462, pp. 138\u2013149. Springer, Heidelberg (2007)"},{"key":"2_CR15","unstructured":"USB Implementers Forum, Inc.: Universal Serial Bus Communication Class Subclass Specification for Ethernet Emulation Model Devices (2005)"},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/3-540-44499-8_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"A. Shamir","year":"2000","unstructured":"Shamir, A.: Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 71\u201377. Springer, Heidelberg (2000)"},{"key":"2_CR17","doi-asserted-by":"publisher","first-page":"1540","DOI":"10.1109\/TC.2008.107","volume":"57","author":"R. Muresan","year":"2008","unstructured":"Muresan, R., Gregori, S.: Protection Circuit against Differential Power Analysis Attacks for Smart Cards. IEEE Transactions on Computers\u00a057, 1540\u20131549 (2008)","journal-title":"IEEE Transactions on Computers"},{"key":"2_CR18","unstructured":"Sun Microsystems Inc.: Application Programming Interface, Java Card Platforms Version 3.0.1 Connected Edition (2009)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27257-8_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:59:17Z","timestamp":1606168757000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27257-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642272561","9783642272578"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27257-8_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}