{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:24:34Z","timestamp":1761974674909,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642385292"},{"type":"electronic","value":"9783642385308"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38530-8_6","type":"book-chapter","created":{"date-parts":[[2013,5,21]],"date-time":"2013-05-21T01:03:00Z","timestamp":1369098180000},"page":"82-97","source":"Crossref","is-referenced-by-count":4,"title":["A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards"],"prefix":"10.1007","author":[{"given":"Michael","family":"Lackner","sequence":"first","affiliation":[]},{"given":"Reinhard","family":"Berlach","sequence":"additional","affiliation":[]},{"given":"Wolfgang","family":"Raschke","sequence":"additional","affiliation":[]},{"given":"Reinhold","family":"Weiss","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Steger","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Akram, R., Markantonakis, K., Mayes, K.: A Paradigm Shift in Smart Card Ownership Model. In: 2010 International Conference on Computational Science and Its Applications (ICCSA), pp. 191\u2013200 (March 2010)","DOI":"10.1109\/ICCSA.2010.52"},{"issue":"2","key":"6_CR2","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/JPROC.2005.862424","volume":"94","author":"H. Bar-El","year":"2006","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The Sorcerer\u2019s Apprentice Guide to Fault Attacks. Proceedings of the IEEE\u00a094(2), 370\u2013382 (2006)","journal-title":"Proceedings of the IEEE"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-37288-9_2","volume-title":"Smart Card Research and Advanced Applications","author":"G. Barbu","year":"2013","unstructured":"Barbu, G., Andouard, P., Giraud, C.: Dynamic Fault Injection Countermeasure. In: Mangard, S. (ed.) CARDIS 2012. LNCS, vol.\u00a07771, pp. 16\u201330. Springer, Heidelberg (2013)"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-642-27257-8_19","volume-title":"Smart Card Research and Advanced Applications","author":"G. Barbu","year":"2011","unstructured":"Barbu, G., Duc, G., Hoogvorst, P.: Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol.\u00a07079, pp. 297\u2013313. Springer, Heidelberg (2011)"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-12510-2_11","volume-title":"Smart Card Research and Advanced Application","author":"G. Barbu","year":"2010","unstructured":"Barbu, G., Thiebeauld, H., Guerin, V.: Attacks on Java Card 3.0 Combining Fault and Logical Attacks. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol.\u00a06035, pp. 148\u2013163. Springer, Heidelberg (2010)"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-642-27257-8_18","volume-title":"Smart Card Research and Advanced Applications","author":"G. Bouffard","year":"2011","unstructured":"Bouffard, G., Iguchi-Cartigny, J., Lanet, J.-L.: Combined Software and Hardware Attacks on the Java Card Control Flow. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol.\u00a07079, pp. 283\u2013296. Springer, Heidelberg (2011)"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/978-3-642-28368-0_26","volume-title":"Cryptography and Security: From Theory to Applications","author":"G. Bouffard","year":"2012","unstructured":"Bouffard, G., Lanet, J.-L.: The Next Smart Card Nightmare. In: Naccache, D. (ed.) Cryphtography and Security: From Theory to Applications. LNCS, vol.\u00a06805, pp. 405\u2013424. Springer, Heidelberg (2012)"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-27257-8_1","volume-title":"Smart Card Research and Advanced Applications","author":"G. Bouffard","year":"2011","unstructured":"Bouffard, G., Lanet, J.-L., Machemie, J.-B., Poichotte, J.-Y., Wary, J.-P.: Evaluation of the Ability to Transform SIM Applications into Hostile Applications. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol.\u00a07079, pp. 1\u201317. Springer, Heidelberg (2011)"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Cowan, C., Wagle, P., Pu, C., Beattie, S., Walpole, J.: Buffer overflows: attacks and defenses for the vulnerability of the decade. In: Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems], pp. 227\u2013237 (2003)","DOI":"10.1109\/FITS.2003.1264935"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Dubreuil, J., Bouffard, G., Lanet, J.-L., Cartigny, J.: Type Classification against Fault Enabled Mutant in Java Based Smart Card. In: 2012 Seventh International Conference on Availability, Reliability and Security (ARES), pp. 551\u2013556 (August 2012)","DOI":"10.1109\/ARES.2012.24"},{"key":"6_CR11","unstructured":"Hamadouche, S., Bouffard, G., Lanet, J.-L., Dorsemaine, B., Nouhant, B., Magloire, A., Reygnaud, A.: Subverting Byte Code Linker service to characterize Java Card API. In: Proceedings of the 7th Conference on Network and Information Systems Security (SAR-SSI), pp. 122\u2013128 (2012)"},{"key":"6_CR12","unstructured":"IEEE: Open SystemC Language Reference Manual IEEE Std 1666-2005, IEEE"},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s11416-009-0135-3","volume":"6","author":"J. Iguchi-Cartigny","year":"2010","unstructured":"Iguchi-Cartigny, J., Lanet, J.-L.: Developing a Trojan applets in a smart card. Journal in Computer Virology\u00a06, 343\u2013351 (2010)","journal-title":"Journal in Computer Virology"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-37288-9_1","volume-title":"Smart Card Research and Advanced Applications","author":"M. Lackner","year":"2013","unstructured":"Lackner, M., Berlach, R., Loinig, J., Weiss, R., Steger, C.: Towards the Hardware Accelerated Defensive Virtual Machine \u2013 Type and Bound Protection. In: Mangard, S. (ed.) CARDIS 2012. LNCS, vol.\u00a07771, pp. 1\u201315. Springer, Heidelberg (2013)"},{"issue":"4","key":"6_CR15","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1002\/spe.438","volume":"32","author":"X. Leroy","year":"2002","unstructured":"Leroy, X.: Bytecode verification on Java smart cards. Software: Practice and Experience\u00a032(4), 319\u2013340 (2002)","journal-title":"Software: Practice and Experience"},{"key":"6_CR16","series-title":"SCI","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-540-71078-3_8","volume-title":"Computational Intelligence in Information Assurance and Security","author":"K. Markantonakis","year":"2007","unstructured":"Markantonakis, K., Mayes, K., Tunstall, M., Sauveron, D., Piper, F.: Smart card security. In: Nedjah, N., Abraham, A., de Macedo Mourelle, L. (eds.) Computational Intelligence in Information Assurance and Security. SCI, vol.\u00a057, pp. 201\u2013233. Springer, Heidelberg (2007), http:\/\/dx.doi.org\/10.1007\/978-3-540-71078-3_8"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-85893-5_1","volume-title":"Smart Card Research and Advanced Applications","author":"W. Mostowski","year":"2008","unstructured":"Mostowski, W., Poll, E.: Malicious Code on Java Card Smartcards: Attacks and Countermeasures. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol.\u00a05189, pp. 1\u201316. Springer, Heidelberg (2008)"},{"key":"6_CR18","unstructured":"Oracle: Runtime Environment Specification. Java Card Platform, Version 3.0.4, Classic Edition (2011)"},{"key":"6_CR19","unstructured":"Oracle: Virtual Machine Specification. Java Card Platform, Version 3.0.4, Classic Edition (2011)"},{"key":"6_CR20","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-642-34135-9_19","volume-title":"Recent Trends in Computer Networks and Distributed Systems Security","author":"T. Razafindralambo","year":"2012","unstructured":"Razafindralambo, T., Bouffard, G., Thampi, B.N., Lanet, J.-L.: A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds.) SNDS 2012. CCIS, vol.\u00a0335, pp. 185\u2013194. Springer, Heidelberg (2012)"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Sauveron, D.: Multiapplication smart card: Towards an open smart card? Information Security Technical Report\u00a014(2), 70\u201378 (2009); Smart Card Applications and Security","DOI":"10.1016\/j.istr.2009.06.007"},{"key":"6_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/978-3-642-17569-5_45","volume-title":"Future Generation Information Technology","author":"A.A.K. S\u00e9r\u00e9","year":"2010","unstructured":"S\u00e9r\u00e9, A.A.K., Iguchi-Cartigny, J., Lanet, J.-L.: Checking the Paths to Identify Mutant Application on Embedded Systems. In: Kim, T.-H., Lee, Y.-H., Kang, B.-H., \u015al\u0119zak, D. (eds.) FGIT 2010. LNCS, vol.\u00a06485, pp. 459\u2013468. Springer, Heidelberg (2010)"},{"issue":"2","key":"6_CR23","first-page":"49","volume":"5","author":"A.A.K. S\u00e9r\u00e9","year":"2011","unstructured":"S\u00e9r\u00e9, A.A.K., Iguchi-Cartigny, J., Lanet, J.-L.: Evaluation of Countermeasures Against Fault Attacks on Smart Cards. International Journal of Security and Its Applications\u00a05(2), 49\u201361 (2011)","journal-title":"International Journal of Security and Its Applications"},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/11889700_21","volume-title":"Fault Diagnosis and Tolerance in Cryptography","author":"O. Vertanen","year":"2006","unstructured":"Vertanen, O.: Java Type Confusion and Fault Attacks. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol.\u00a04236, pp. 237\u2013251. Springer, Heidelberg (2006)"},{"key":"6_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-642-12510-2_10","volume-title":"Smart Card Research and Advanced Application","author":"E. Vetillard","year":"2010","unstructured":"Vetillard, E., Ferrari, A.: Combined Attacks and Countermeasures. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol.\u00a06035, pp. 133\u2013147. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38530-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T10:42:59Z","timestamp":1746009779000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38530-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642385292","9783642385308"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38530-8_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}