{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:32:28Z","timestamp":1725687148996},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642304354"},{"type":"electronic","value":"9783642304361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30436-1_4","type":"book-chapter","created":{"date-parts":[[2012,6,5]],"date-time":"2012-06-05T16:20:29Z","timestamp":1338913229000},"page":"37-48","source":"Crossref","is-referenced-by-count":9,"title":["Embedded Eavesdropping on Java Card"],"prefix":"10.1007","author":[{"given":"Guillaume","family":"Barbu","sequence":"first","affiliation":[]},{"given":"Christophe","family":"Giraud","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Guerin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","first-page":"291","volume":"8","author":"M. Witteman","year":"2003","unstructured":"Witteman, M.: Java Card Security. Information Security Bulletin\u00a08, 291\u2013298 (2003)","journal-title":"Information Security Bulletin"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-85893-5_1","volume-title":"Smart Card Research and Advanced Applications","author":"W. Mostowski","year":"2008","unstructured":"Mostowski, W., Poll, E.: Malicious Code on Java Card Smartcards: Attacks and Countermeasures. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol.\u00a05189, pp. 1\u201316. Springer, Heidelberg (2008)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Sere, A.A., Iguchi-Cartigny, J., Lanet, J.L.: Automatic Detection of Fault Attack and Countermeasures. In: WESS 2009, pp. 1\u20137 (2009)","DOI":"10.1145\/1631716.1631723"},{"key":"4_CR4","unstructured":"Hogenboom, J., Mostowski, W.: Full Memory Attack on a Java Card. In: 4th Benelux Workshop on Information and System Security (2009)"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s11416-009-0135-3","volume":"6","author":"J. Iguchi-Cartigny","year":"2010","unstructured":"Iguchi-Cartigny, J., Lanet, J.L.: Developing a Trojan Applet in a Smart Card. Journale on Computers and Virology\u00a06, 343\u2013351 (2010)","journal-title":"Journale on Computers and Virology"},{"key":"4_CR6","unstructured":"Lindholm, T., Yellin, F.: Java Virtual Machine Specification, 2nd edn. Addison-Wesley, Inc. (1999)"},{"key":"4_CR7","unstructured":"Sun Microsystems Inc.: Virtual Machine Specification \u2013 Java Card Plateform, Version 3.0.1 (2009)"},{"key":"4_CR8","unstructured":"Sun Microsystems Inc.: Application Programming Interface, Java Card Platform, Version 3.0.1 Connected Edition (2009)"},{"key":"4_CR9","unstructured":"Sun Microsystems Inc.: Java Servlet Specification, Java Card Platform, Version 3.0.1 Connected Edition (2009)"},{"key":"4_CR10","unstructured":"Sun Microsystems Inc.: Runtime Environment Specification, Java Card Platform, Version 3.0.1 Connected Edition (2009)"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-44709-1_21","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"K. Gandolfi","year":"2001","unstructured":"Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic Analysis: Concrete Results. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 251\u2013261. Springer, Heidelberg (2001)"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Giraud, C., Thiebeauld, H.: A Survey on Fault Attacks. In: CARDIS 2004, pp. 159\u2013176. Kluwer Academic Publishers (2004)","DOI":"10.1007\/1-4020-8147-2_11"},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/JPROC.2005.862424","volume":"94","author":"H. Bar-El","year":"2006","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The Sorcerer\u2019s Apprentice Guide to Fault Attacks. IEEE\u00a094, 370\u2013382 (2006)","journal-title":"IEEE"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-36400-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S. Skorobogatov","year":"2003","unstructured":"Skorobogatov, S., Anderson, R.: Optical Fault Induction Attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 2\u201312. Springer, Heidelberg (2003)"},{"key":"4_CR16","unstructured":"Quisquater, J.J., Samyde, D.: Eddy Current for Magnetic Analysis with Active Sensor. In: e-Smart 2002 (2002)"},{"key":"4_CR17","unstructured":"Barbu, G.: Fault Attacks on Java Card 3 Virtual Machine. In: e-Smart 2009 (2009)"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-642-27257-8_19","volume-title":"Smart Card Research and Advanced Applications","author":"G. Barbu","year":"2011","unstructured":"Barbu, G., Duc, G., Hoogvorst, P.: Java Card Operand Stack:\u00a0Fault Attacks, Combined Attacks and Countermeasures. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol.\u00a07079, pp. 297\u2013313. Springer, Heidelberg (2011)"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"ESSoS 2012","author":"G. Barbu","year":"2012","unstructured":"Barbu, G., Hoogvorst, P., Duc, G.: Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused. In: Scandariato, R. (ed.) ESSoS 2012. LNCS, vol.\u00a07159, pp. 1\u201313. Springer, Heidelberg (2012)"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-642-12510-2_10","volume-title":"Smart Card Research and Advanced Application","author":"E. Vetillard","year":"2010","unstructured":"Vetillard, E., Ferrari, A.: Combined Attacks and Countermeasures. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol.\u00a06035, pp. 133\u2013147. Springer, Heidelberg (2010)"},{"key":"4_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-642-27257-8_2","volume-title":"Smart Card Research and Advanced Applications","author":"G. Barbu","year":"2011","unstructured":"Barbu, G., Thiebeauld, H.: Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.0 -. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol.\u00a07079, pp. 18\u201333. Springer, Heidelberg (2011)"},{"key":"4_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-12510-2_11","volume-title":"Smart Card Research and Advanced Application","author":"G. Barbu","year":"2010","unstructured":"Barbu, G., Thiebeauld, H., Guerin, V.: Attacks on Java Card 3.0 Combining Fault and Logical Attacks. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol.\u00a06035, pp. 148\u2013163. Springer, Heidelberg (2010)"},{"key":"4_CR23","unstructured":"GlobalPlatform Inc.: GlobalPlatform Card Specification 2.2.1 (2011)"},{"key":"4_CR24","unstructured":"GlobalPlatform Inc.: GlobalPlatform Card Specification 2.2, Amendment C, Contactless Services (2010)"},{"key":"4_CR25","unstructured":"European Telecommunications Standards Institute: Card Application Toolkit (CAT) (Release 10) (2011)"},{"key":"4_CR26","unstructured":"European Telecommunications Standards Institute: Universal Subscriber Identity Module (USIM) Application Toolkit (USAT) (Release 10) (2011)"},{"key":"4_CR27","unstructured":"GlobalPlatform Inc.: Java Card Contactless API and Export File for Card Specification v2.2.1 (org.globalplatform.contactless) v1.0 (2011)"},{"key":"4_CR28","unstructured":"European Telecommunications Standards Institute: UICC Application Programming Interface (UICC API) for Java Card (Release 9) (2011)"},{"key":"4_CR29","unstructured":"European Telecommunications Standards Institute: (U)SIM Application Programming Interface ((U)SIM API) for Java Card (Release 10) (2011)"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Security and Privacy Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30436-1_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:39:40Z","timestamp":1620128380000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30436-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642304354","9783642304361"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30436-1_4","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2012]]}}}