{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T16:26:12Z","timestamp":1770567972816,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642407925","type":"print"},{"value":"9783642407932","type":"electronic"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40793-2_8","type":"book-chapter","created":{"date-parts":[[2013,8,27]],"date-time":"2013-08-27T02:10:59Z","timestamp":1377569459000},"page":"82-93","source":"Crossref","is-referenced-by-count":2,"title":["Vulnerability Analysis on Smart Cards Using Fault Tree"],"prefix":"10.1007","author":[{"given":"Guillaume","family":"Bouffard","sequence":"first","affiliation":[]},{"given":"Bhagyalekshmy N.","family":"Thampi","sequence":"additional","affiliation":[]},{"given":"Jean-Louis","family":"Lanet","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"8_CR1","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1145\/7474.7528","volume":"16","author":"N.G. Leveson","year":"1986","unstructured":"Leveson, N.G.: Software Safety - What, Why And How? ACM Computing Surveys\u00a016(2), 125\u2013164 (1986)","journal-title":"ACM Computing Surveys"},{"key":"8_CR2","unstructured":"Stamatis, D.H.: Failure Mode and Effect Analysis: FMEA from Theory to Execution. ASQ Press (1995)"},{"key":"8_CR3","unstructured":"Helmer, G., Wong, J., Slagell, M., Honavar, V., Miller, L., Wang, Y., Lutz, R.: Software fault tree and colored petri net based specification, design and implementation of agent-based intrusion detection systems. IEEE Transactions of Software Engineering (2002) (submitted)"},{"key":"8_CR4","unstructured":"Prevost, S., Sachdeva, K.: Application code integrity check during virtual machine runtime. US Patent App. 10\/929,221 (2004)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Moore, A.P., Ellison, R.J., Linger, R.C.: Attack modeling for information security and survivability. Technical report, DTIC Document (2001)","DOI":"10.21236\/ADA387544"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Fronczak, E.: A top-down approach to high-consequence fault analysis for software systems. In: Proceedings of the Eighth International Symposium on Software Reliability Engineering, p. 259. IEEE (1997)","DOI":"10.1109\/ISSRE.1997.630873"},{"key":"8_CR7","unstructured":"Byres, E.J., Franz, M., Miller, D.: The Use of Attack Trees in Assessing Vulnerabilities in SCADA Systems. In: International Infrastructure Survivability Workshop (IISW 2004). IEEE (2004)"},{"key":"8_CR8","unstructured":"Oracle: Java Card 3 Platform, Virtual Machine Specification, Classic Edition. Oracle, Oracle America, Inc., 500 Oracle Parkway, Redwood City, CA 94065 (2011)"},{"key":"8_CR9","unstructured":"GlobalPlatform: Card Specification. 2.2.1 edn. GlobalPlatform Inc. (2011)"},{"key":"8_CR10","unstructured":"Hubbers, E., Poll, E.: Transactions and non-atomic API methods in Java Card: specification ambiguity and strange implementation behaviours. Technical Report NIII-R0438, Radboud University Nijmegen (2004)"},{"issue":"4","key":"8_CR11","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s11416-009-0135-3","volume":"6","author":"J. Iguchy-Cartigny","year":"2009","unstructured":"Iguchy-Cartigny, J., Lanet, J.L.: Developing a Trojan applets in a smart card. Journal in Computer Virology\u00a06(4), 343\u2013351 (2009)","journal-title":"Journal in Computer Virology"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-642-12510-2_10","volume-title":"Smart Card Research and Advanced Application","author":"E. Vetillard","year":"2010","unstructured":"Vetillard, E., Ferrari, A.: Combined Attacks and Countermeasures. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol.\u00a06035, pp. 133\u2013147. Springer, Heidelberg (2010)"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-642-27257-8_18","volume-title":"Smart Card Research and Advanced Applications","author":"G. Bouffard","year":"2011","unstructured":"Bouffard, G., Iguchi-Cartigny, J., Lanet, J.-L.: Combined Software and Hardware Attacks on the Java Card Control Flow. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol.\u00a07079, pp. 283\u2013296. Springer, Heidelberg (2011)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Dubreuil, J., Bouffard, G., Lanet, J.L., Iguchy-Cartigny, J.: Type classification against Fault Enabled Mutant in Java based Smart Card. In: Sixth International Workshop on Secure Software Engineering (SecSE), pp. 551\u2013556. Springer (2012)","DOI":"10.1109\/ARES.2012.24"},{"key":"8_CR15","unstructured":"Barbu, G.: On the security of Java CardTMplatforms against hardware attacks. PhD thesis, Grant-funded with Oberthur Technologies and T\u00e9l\u00e9com ParisTech. (2012)"},{"key":"8_CR16","first-page":"311","volume-title":"ACM Conference on Computer and Communications Security","author":"J. Bl\u00f6mer","year":"2003","unstructured":"Bl\u00f6mer, J., Otto, M., Seifert, J.P.: A new CRT-RSA algorithm secure against bellcore attacks. In: ACM Conference on Computer and Communications Security, pp. 311\u2013320. ACM, Washington, DC (2003)"},{"key":"8_CR17","first-page":"92","volume-title":"ACM Conference on Computer and Communications Security","author":"D. Wagner","year":"2004","unstructured":"Wagner, D.: Cryptanalysis of a provably secure CRT-RSA algorithm. In: ACM Conference on Computer and Communications Security, pp. 92\u201397. ACM, Washington, DC (2004)"},{"key":"8_CR18","unstructured":"Girard, P.: Contribution \u00e0 la s\u00e9curit\u00e9 des cartes \u00e0 puce et de leur utilisation. Habilitation thesis, University of Limoges (2011)"},{"key":"8_CR19","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-642-34135-9_19","volume-title":"Recent Trends in Computer Networks and Distributed Systems Security","author":"T. Razafindralambo","year":"2012","unstructured":"Razafindralambo, T., Bouffard, G., Thampi, B.N., Lanet, J.-L.: A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds.) SNDS 2012. CCIS, vol.\u00a0335, pp. 185\u2013194. Springer, Heidelberg (2012)"},{"key":"8_CR20","unstructured":"Al\u00a0Khary\u00a0S\u00e9r\u00e9, A.: Tissage de contremesures pour machines virtuelles embarqu\u00e9es. PhD thesis, Universit\u00e9 de Limoges, 123 Avenue Albert Thomas, 87100 Limoges Cedex (2010)"},{"key":"8_CR21","unstructured":"Akkar, M.L., Goubin, L., Ly, O., et al.: Automatic integration of counter-measures against fault injection attacks (2003), Pre-print found at http:\/\/www.labri.fr\/Perso\/ly\/index.htm"},{"issue":"1","key":"8_CR22","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/1609956.1609960","volume":"13","author":"M. Abadi","year":"2009","unstructured":"Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-flow integrity principles, implementations, and applications. ACM Transactions on Information and System Security (TISSEC)\u00a013(1), 4 (2009)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"8_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-642-14706-7_7","volume-title":"Computer Network Security","author":"L. Pi\u00e8tre-Cambac\u00e9d\u00e8s","year":"2010","unstructured":"Pi\u00e8tre-Cambac\u00e9d\u00e8s, L., Bouissou, M.: Attack and Defense Modeling with BDMP. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2010. LNCS, vol.\u00a06258, pp. 86\u2013101. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40793-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,2]],"date-time":"2020-08-02T16:18:00Z","timestamp":1596385080000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40793-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642407925","9783642407932"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40793-2_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}