{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:42:59Z","timestamp":1725702179968},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_19","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T08:08:15Z","timestamp":1347264495000},"page":"185-194","source":"Crossref","is-referenced-by-count":10,"title":["A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks"],"prefix":"10.1007","author":[{"given":"Tiana","family":"Razafindralambo","sequence":"first","affiliation":[]},{"given":"Guillaume","family":"Bouffard","sequence":"additional","affiliation":[]},{"given":"Bhagyalekshmy N.","family":"Thampi","sequence":"additional","affiliation":[]},{"given":"Jean-Louis","family":"Lanet","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"Aranda, F.X., Lanet, J.L.: Smart Card Reverse-Engineering Code Execution Using Side-Channel Analysis. NTCCS, Th\u00e9orie des Nombres, Codes, Cryptographie et Syst\u00e8mes de Communication, Oujda, Marocco (April 2012)"},{"key":"19_CR2","unstructured":"Barbu, G.: On the security of Java Card platforms against hardware attacks. Ph.D. thesis, T\u00c9L\u00c9COM ParisTech (2012)"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-12510-2_11","volume-title":"Smart Card Research and Advanced Application","author":"G. Barbu","year":"2010","unstructured":"Barbu, G., Thiebeauld, H., Guerin, V.: Attacks on Java Card 3.0 Combining Fault and Logical Attacks. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol.\u00a06035, pp. 148\u2013163. Springer, Heidelberg (2010)"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-27257-8_1","volume-title":"Smart Card Research and Advanced Applications","author":"G. Bouffard","year":"2011","unstructured":"Bouffard, G., Lanet, J.-L., Machemie, J.-B., Poichotte, J.-Y., Wary, J.-P.: Evaluation of the Ability to Transform SIM Applications into Hostile Applications. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol.\u00a07079, pp. 1\u201317. Springer, Heidelberg (2011)"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-642-27257-8_18","volume-title":"Smart Card Research and Advanced Applications","author":"G. Bouffard","year":"2011","unstructured":"Bouffard, G., Iguchi-Cartigny, J., Lanet, J.-L.: Combined Software and Hardware Attacks on the Java Card Control Flow. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol.\u00a07079, pp. 283\u2013296. Springer, Heidelberg (2011)"},{"key":"19_CR6","unstructured":"Clavier, C.: De la s\u00e9curit\u00e9 physique des crypto-syst\u00e8mes embarqu\u00e9s. Ph.D. thesis, Universit\u00e9 de Versailles Saint-Quentin-en-Yvelines (2007)"},{"key":"19_CR7","unstructured":"Global Platform: Card Specification v2.2 (2006)"},{"key":"19_CR8","unstructured":"Hamadouche, S.: \u00c9tude de la s\u00e9curit\u00e9 d\u2019un v\u00e9rifieur de Byte Code et g\u00e9n\u00e9ration de tests de vuln\u00e9rabilit\u00e9. Master\u2019s thesis, Universit\u00e9 de Boumerd\u00e9s (2012)"},{"key":"19_CR9","unstructured":"Hubbers, E., Poll, E.: Transactions and non-atomic API calls in Java Card: specification ambiguity and strange implementation behaviours. Dept. of Computer Science NIII-R0438, Radboud University Nijmegen (2004)"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Iguchi-Cartigny, J., Lanet, J.: Developing a Trojan applet in a Smart Card. Journal in Computer Virology (2010)","DOI":"10.1007\/s11416-009-0135-3"},{"key":"19_CR11","unstructured":"ISO\/IEC: Common Criteria v3.0. Tech. rep., ISO\/IEC 15408:2005 Information technology - Security techniques - Evaluation criteria for IT security (2005)"},{"key":"19_CR12","unstructured":"Oracle: Java Card Platform Specification"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Petri, S.: An introduction to smart cards. Secure Service Provider TM (2002), \n                    \n                      http:\/\/www.artofconfusion.org\/smartcards\/docs\/intro.pdf","DOI":"10.1145\/504689.504690"},{"key":"19_CR14","unstructured":"Smart Secure Devices (SSD) Team \u2013 XLIM, Universit\u00e9 de Limoges: The CAP file manipulator, \n                    \n                      http:\/\/secinfo.msi.unilim.fr\/"},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-540-72354-7_12","volume-title":"Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems","author":"D. Vermoen","year":"2007","unstructured":"Vermoen, D., Witteman, M., Gaydadjiev, G.N.: Reverse Engineering Java Card Applets Using Power Analysis. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol.\u00a04462, pp. 138\u2013149. Springer, Heidelberg (2007)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T08:45:45Z","timestamp":1620117945000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}