{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T19:14:36Z","timestamp":1648926876417},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,5,17]],"date-time":"2016-05-17T00:00:00Z","timestamp":1463443200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s11416-016-0276-0","type":"journal-article","created":{"date-parts":[[2016,5,17]],"date-time":"2016-05-17T18:51:53Z","timestamp":1463511113000},"page":"109-123","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Chronicle of a Java Card death"],"prefix":"10.1007","volume":"13","author":[{"given":"Mozhdeh","family":"Farhadi","sequence":"first","affiliation":[]},{"given":"Jean-Louis","family":"Lanet","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,17]]},"reference":[{"key":"276_CR1","doi-asserted-by":"crossref","unstructured":"Barbu, G., Thiebeauld, H., Guerin, V.: Attacks on Java Card 3.0 combining fault and logical attacks. In: Smart Card Research and Advanced Application, pp. 148\u2013163. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-12510-2_11"},{"key":"276_CR2","doi-asserted-by":"publisher","unstructured":"Barbu, G., Andouard, P., Giraud, C.: Dynamic fault injection countermeasure. In: Mangard, S. (ed.) Smart Card Research and Advanced Applications, Lecture Notes in Computer Science, vol. 7771, pp. 16\u201330. Springer, Berlin (2013). doi: 10.1007\/9783642372889_2","DOI":"10.1007\/9783642372889_2"},{"key":"276_CR3","doi-asserted-by":"publisher","unstructured":"Barenghi, A., Breveglieri, L., Koren, I., Pelosi, G., Regazzoni, F.: Countermeasures against fault attacks on software implemented aes: effectiveness and cost. In: Proceedings of the 5th Workshop on Embedded Systems Security, WESS \u201910, pp. 7:1\u20137:10. ACM, New York (2010). doi: 10.1145\/1873548.1873555","DOI":"10.1145\/1873548.1873555"},{"key":"276_CR4","doi-asserted-by":"crossref","unstructured":"Bistarelli, S., Fioravanti, F., Peretti, P.: Defense trees for economic evaluation of security investments. In: The First International Conference on Availability, Reliability and Security, 2006. ARES 2006, IEEE (2006)","DOI":"10.1109\/ARES.2006.46"},{"key":"276_CR5","unstructured":"Bouffard, G.: A generic approach for protecting java card smart card against software attacks, Ph.D. thesis, University of Limoges, 123 Avenue Albert Thomas, 87060 LIMOGES CEDEX (2014)"},{"key":"276_CR6","unstructured":"Bouffard, G., Lanet, J.-L.: The next smart card nightmare - logical attacks, combined attacks, mutant applications and other funny things. In: Cryptography and Security: From Theory to Applications\u2014Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (2012)"},{"key":"276_CR7","doi-asserted-by":"publisher","first-page":"3346","DOI":"10.1016\/j.cose.2015.01.004","volume":"50","author":"G Bouffard","year":"2015","unstructured":"Bouffard, G., Lanet, J.-L.: The ultimate control fow transfer in a Java based smart card. Comput. Secur. 50, 3346 (2015). doi: 10.1016\/j.cose.2015.01.004","journal-title":"Comput. Secur."},{"key":"276_CR8","doi-asserted-by":"publisher","unstructured":"Bouffard, G., Lackner, M., Lanet, J.-L., Loinig, J.: Heap ... Hop! Heap is also vulnerable. In: Joye, M., Moradi A. (eds.) Smart Card Research and Advanced Applications\u201413th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers, Lecture Notes in Computer Science, vol. 8968, pp. 18\u201331. Springer, Berlin (2014). doi: 10.1007\/9783319167633_2","DOI":"10.1007\/9783319167633_2"},{"issue":"2","key":"276_CR9","doi-asserted-by":"publisher","first-page":"149163","DOI":"10.1016\/S09518320(03)001431","volume":"82","author":"M Bouissou","year":"2003","unstructured":"Bouissou, M., Bon, J.: A new formalism that combines advantages of faulttrees and markov models: Boolean logic driven markov processes. Rel. Eng. Syst. Saf. 82(2), 149163 (2003). doi: 10.1016\/S09518320(03)001431","journal-title":"Rel. Eng. Syst. Saf."},{"key":"276_CR10","unstructured":"Chen, Z.: Java Card Technology for Smart Cards: architecture and programmer\u2019s guide. Addison-Wesley. https:\/\/books.google.co.uk\/books?id=4WDj4H6pT50C (2000)"},{"key":"276_CR11","unstructured":"Common Criteria, Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and General Model (2009) version 3.1, Revision 3 (CCMB-2009-07-001) (2009)"},{"issue":"1","key":"276_CR12","doi-asserted-by":"crossref","first-page":"19","DOI":"10.4018\/jsse.2013040102","volume":"4","author":"J Dubreuil","year":"2013","unstructured":"Dubreuil, J., Lanet, J.-L., Bouffard, G., Thampi, B.N.: Mitigating type confusion on Java Card. Int. J. Secure Softw. Eng. (IJSSE) 4(1), 19\u201339 (2013)","journal-title":"Int. J. Secure Softw. Eng. (IJSSE)"},{"key":"276_CR13","doi-asserted-by":"publisher","unstructured":"El-Idrissi, N.E.J., El-Hajji, S., Lanet, J.-L.: Countermeasures mitigation for designing rich shell code in Java Card. In: Codes, Cryptology, and Information Security - First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings\u2014In Honor of Thierry Berger, pp. 149\u2013161 (2015). doi: 10.1007\/9783319186818_12","DOI":"10.1007\/9783319186818_12"},{"key":"276_CR14","doi-asserted-by":"publisher","unstructured":"Faugeron, E.: Manipulating the frame information with an underflow attack. In: Smart Card Research and Advanced Applications\u201412th International Conference, CARDIS 2013, Berlin, Germany, November 27- 29, 2013. Revised Selected Papers, pp. 140\u2013151 (2013). doi: 10.1007\/9783319083025_10","DOI":"10.1007\/9783319083025_10"},{"key":"276_CR15","unstructured":"Faugeron, E., Valette, S.: How to hoax an on-card verifier, Accepted Talk at e-Smart, vol. 10 (2010)"},{"key":"276_CR16","unstructured":"Hamadouche, S., Bouffard, G., Lanet, J.-L., Dorsemaine, B., Nouhant, B., Magloire, A., Reygnaud, A.: Subverting Byte Code Linker service to characterize Java Card API. In: Seventh Conference on Network and Information Systems Security (SAR-SSI), pp. 75\u201381 (2012)"},{"key":"276_CR17","unstructured":"Hogenboom, J., Mostowski, W.: Full memory read attack on a Java Card. In: 4th Benelux Workshop on Information and System Security Proceedings (WISSEC09) (2009)"},{"key":"276_CR18","unstructured":"Hubbers, E., Poll, E.: Transactions and Non-atomic api Calls in Java Card: Specification Ambiguity and Strange Implementation Behaviors. Radboud University Nijmegen, Nijmegen"},{"issue":"4","key":"276_CR19","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s11416-009-0135-3","volume":"6","author":"J Iguchi-Cartigny","year":"2010","unstructured":"Iguchi-Cartigny, J., Lanet, J.-L.: Developing a Trojan applets in a smart card. J. Comput. Virol. 6(4), 343\u2013351 (2010). doi: 10.1007\/s11416-009-0135-3","journal-title":"J. Comput. Virol."},{"key":"276_CR20","doi-asserted-by":"crossref","unstructured":"Lancia, J., Bouffard, G.: Java Card virtual machine compromising from a byte code verified applet. In: Smart Card Research and Advanced Applications\u201414th International Conference, CARDIS 2015, Bochum (2015)","DOI":"10.1007\/978-3-319-31271-2_5"},{"key":"276_CR21","doi-asserted-by":"crossref","unstructured":"Laugier, B., Razafindralambo, T.: Misuse of frame creation to exploit stack underflow attacks on Java Card. In: Smart Card Research and Advanced Applications\u201414th International Conference, CARDIS 2015, Bochum (2015)","DOI":"10.1007\/978-3-319-31271-2_6"},{"key":"276_CR22","unstructured":"Mostowski, W.: Formal development of safe and secure java card applets, Tech. rep. (2005)"},{"key":"276_CR23","doi-asserted-by":"publisher","unstructured":"Mostowski, W., Poll, E.: Malicious code on java card smartcards: attacks and countermeasures. In: Grimaud, G., Standaert, F.-X. (eds.) Smart Card Research and Advanced Applications, Lecture Notes in Computer Science, vol. 5189, p. 116. Springer, Berlin (2008). doi: 10.1007\/9783540858935_1","DOI":"10.1007\/9783540858935_1"},{"key":"276_CR24","unstructured":"Oracle, Java Card 3 Platform, Virtual Machine Specification, Classic Edition, no. Version 3.0.4, Oracle, Oracle America, Inc., Redwood City (2011)"},{"issue":"8","key":"276_CR25","doi-asserted-by":"crossref","first-page":"929","DOI":"10.1002\/sec.299","volume":"5","author":"A Roy","year":"2012","unstructured":"Roy, A., Kim, D.S., Trivedi, K.S.: Attack countermeasure trees (act): towards unifying the constructs of attack and defense trees. Secur. Commun. Netw. 5(8), 929\u2013943 (2012)","journal-title":"Secur. Commun. Netw."},{"issue":"12","key":"276_CR26","first-page":"21","volume":"24","author":"B Schneier","year":"1999","unstructured":"Schneier, B.: Attack trees. Dr. Dobb J. 24(12), 21\u201329 (1999)","journal-title":"Attack trees. Dr. Dobb J."},{"key":"276_CR27","unstructured":"Sun Microsystems, Java Card Platform Security, Technical White Paper, October 2001"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-016-0276-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-016-0276-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-016-0276-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-016-0276-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T19:24:16Z","timestamp":1567884256000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-016-0276-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,17]]},"references-count":27,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["276"],"URL":"https:\/\/doi.org\/10.1007\/s11416-016-0276-0","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,17]]}}}