{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T03:57:05Z","timestamp":1648612625918},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T00:00:00Z","timestamp":1477958400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1007\/s13389-016-0142-5","type":"journal-article","created":{"date-parts":[[2016,10,31]],"date-time":"2016-10-31T23:42:47Z","timestamp":1477957367000},"page":"21-34","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Trust can be misplaced"],"prefix":"10.1007","volume":"7","author":[{"given":"Noreddine El Janati El","family":"Idrissi","sequence":"first","affiliation":[]},{"given":"Guillaume","family":"Bouffard","sequence":"additional","affiliation":[]},{"given":"Jean-Louis","family":"Lanet","sequence":"additional","affiliation":[]},{"given":"Said El","family":"Hajji","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,1]]},"reference":[{"key":"142_CR1","unstructured":"Barbu, G.: On the security of Java Card platforms against hardware attacks. Ph.D. thesis, T\u00e9l\u00e9com ParisTech (2012)"},{"key":"142_CR2","doi-asserted-by":"crossref","unstructured":"Barbu, G., Duc, G., Hoogvorst, P.: Java Card operand stack: fault attacks, combined attacks and countermeasures. In: Prouff [23], pp. 297\u2013313 (2011)","DOI":"10.1007\/978-3-642-27257-8_19"},{"key":"142_CR3","doi-asserted-by":"crossref","unstructured":"Barbu, G., Giraud, C., Guerin, V.: Embedded eavesdropping on Java Card. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC. IFIP Advances in Information and Communication Technology, vol. 376, pp. 37\u201348. Springer, New York (2012)","DOI":"10.1007\/978-3-642-30436-1_4"},{"key":"142_CR4","doi-asserted-by":"crossref","unstructured":"Barbu, G., Hoogvorst, P., Duc, G.: Application-replay attack on Java Cards: when the garbage collector gets confused. In: Barthe, G., Livshits, B., Scandariato, R. (eds.) ESSoS. Lecture Notes in Computer Science, vol. 7159, pp. 1\u201313. Springer (2012)","DOI":"10.1007\/978-3-642-28166-2_1"},{"key":"142_CR5","doi-asserted-by":"crossref","unstructured":"Barbu, G., Thiebeauld, H., Guerin, V.: Attacks on Java Card 3.0 combining fault and logical attacks. In: Gollmann et\u00a0al. [14], pp. 148\u2013163","DOI":"10.1007\/978-3-642-12510-2_11"},{"key":"142_CR6","unstructured":"Bouffard, G.: A generic approach for protecting Java Card smart card against software attacks. Ph.D. thesis, University of Limoges, 123 Avenue Albert Thomas, 87060 Limoges Cedex (2014)"},{"key":"142_CR7","doi-asserted-by":"crossref","unstructured":"Bouffard, G., Iguchi-Cartigny, J., Lanet, J.-L.: Combined software and hardware attacks on the Java Card control flow. In: Prouff [23], pp. 283\u2013296","DOI":"10.1007\/978-3-642-27257-8_18"},{"key":"142_CR8","doi-asserted-by":"crossref","unstructured":"Bouffard, G., Khefif, T., Lanet, J., Kane, I., Salvia, S.C.: Accessing secure information using export file fraudulence. In: Crispo, B., Sandhu, R.S., Cuppens-Boulahia, N., Conti, M., Lanet, J. (eds.) 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), La Rochelle, France, October 23\u201325, 2013, pp. 1\u20135. IEEE (2013)","DOI":"10.1109\/CRiSIS.2013.6766346"},{"issue":"4","key":"142_CR9","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/s11416-014-0218-7","volume":"10","author":"G Bouffard","year":"2014","unstructured":"Bouffard, G., Lanet, J.: Reversing the operating system of a Java based smart card. J. Comput. Virol. Hacking Tech. 10(4), 239\u2013253 (2014)","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"142_CR10","doi-asserted-by":"publisher","unstructured":"Farhadi, M., Lanet, J.-L.: Chronicle of a Java Card death. J. Comput. Virol. Hacking Tech. 1\u201315 (2016). doi: 10.1007\/s11416-016-0276-0","DOI":"10.1007\/s11416-016-0276-0"},{"key":"142_CR11","doi-asserted-by":"crossref","unstructured":"Faugeron, E.: Manipulating the frame information with an underflow attack. In: Francillon, A., Rohatgi, P. (eds.) CARDIS. Lecture Notes in Computer Science, vol. 8419. Springer (2013)","DOI":"10.1007\/978-3-319-08302-5_10"},{"key":"142_CR12","unstructured":"Faugeron, E., Valette, S.: How to hoax an off-card verifier. e-smart, France (2010)"},{"key":"142_CR13","unstructured":"GlobalPlatform. Card Specification, 2.2.1 edn. GlobalPlatform Inc., Redwood City, CA (2011)"},{"key":"142_CR14","doi-asserted-by":"crossref","unstructured":"Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) In: Proceedings of Smart Card Research and Advanced Application, CARDIS, Passau, Germany, April 14\u201316, 2010. Lecture Notes in Computer Science, vol. 6035. Springer (2010)","DOI":"10.1007\/978-3-642-12510-2"},{"key":"142_CR15","unstructured":"Hamadouche, S., Bouffard, G., Lanet, J.-L., Dorsemaine, B., Nouhant, B., Magloire, A., Reygnaud, A.: Subverting byte code linker service to characterize Java Card API. In: Seventh conference on network and information systems security (SAR-SSI), pp. 75\u201381, May 22\u201325 (2012)"},{"issue":"2\u20133","key":"142_CR16","first-page":"130","volume":"18","author":"S Hamadouche","year":"2013","unstructured":"Hamadouche, S., Lanet, J.L.: Virus in a smart card: myth or reality? J. Inf. Secur. Appl. 18(2\u20133), 130\u2013137 (2013)","journal-title":"J. Inf. Secur. Appl."},{"issue":"4","key":"142_CR17","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1007\/s11416-009-0135-3","volume":"6","author":"J Iguchi-Cartigny","year":"2010","unstructured":"Iguchi-Cartigny, J., Lanet, J.-L.: Developing a Trojan applets in a smart card. J. Comput. Virol. 6(4), 343\u2013351 (2010)","journal-title":"J. Comput. Virol."},{"key":"142_CR18","doi-asserted-by":"crossref","unstructured":"Lancia, J., Bouffard, G.: Java Card virtual machine compromising from a bytecode verified applet. In: Homma, N., Medwed, M.(eds.) Smart Card Research and Advanced Applications. CARDIS, Bochum (2015)","DOI":"10.1007\/978-3-319-31271-2_5"},{"key":"142_CR19","unstructured":"Lancia, J., Bouffard, G.: Fuzzing and overflows in Java Card smart cards. In: Symposium sur la s\u00e9curit\u00e9 des technologies de l\u2019information et des communications (SSTIC), June (2016)"},{"key":"142_CR20","doi-asserted-by":"crossref","unstructured":"Lanet, J.-L., Bouffard, G., Lamrani, R., Chakra, R., Mestiri, A., Monsif, M., Fandi, A.: Memory forensics of a Java Card dump. In: Joye, M., Moradi, A. (eds.) Smart Card Research and Advanced Applications, CARDIS, Paris, France, Nov. 5\u20137, 2014. Lecture Notes in Computer Science, vol. 8968, pp. 3\u201317. Springer (2014)","DOI":"10.1007\/978-3-319-16763-3_1"},{"key":"142_CR21","doi-asserted-by":"crossref","unstructured":"Mostowski, W., Poll, E.: Malicious Code on Java Card smartcards: attacks and countermeasures. In: Grimaud, G., Standaert, F. (eds.) Proceedings of Smart Card Research and Advanced Applications, CARDIS, London, UK, September 8\u201311, 2008. Lecture Notes in Computer Science, vol. 5189, pp. 1\u201316. Springer (2008)","DOI":"10.1007\/978-3-540-85893-5_1"},{"key":"142_CR22","unstructured":"Oracle. Java Card 3 Platform, Virtual Machine Specification, Classic Edition. Number Version 3.0.4. Oracle, Oracle America, Inc., 500 Oracle Parkway, Redwood City, CA 94065 (2011)"},{"key":"142_CR23","doi-asserted-by":"crossref","unstructured":"Prouff, E. (ed.) Smart Card Research and Advanced Applications, CARDIS, Leuven, Belgium, September 14\u201316, 2011. Lecture Notes in Computer Science, vol. 7079. Springer (2011)","DOI":"10.1007\/978-3-642-27257-8"},{"key":"142_CR24","doi-asserted-by":"crossref","unstructured":"Razafindralambo, T., Bouffard, G., Lanet, J.-L.: A Friendly Framework for Hidding fault enabled virus for Java Based Smartcard. In: Cuppens-Boulahia, N., Cuppens, F., Garc\u00eda-Alfaro, J. (eds.) DBSec. Lecture Notes in Computer Science, vol. 7371, pp. 122\u2013128. Springer (2012)","DOI":"10.1007\/978-3-642-31540-4_10"},{"key":"142_CR25","doi-asserted-by":"crossref","unstructured":"Vetillard E., Ferrari A. Combined attacks and coun- termeasures. In: Gollmann et al. [14], pp. 133\u2013147","DOI":"10.1007\/978-3-642-12510-2_10"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-016-0142-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13389-016-0142-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-016-0142-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T01:27:59Z","timestamp":1568510879000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13389-016-0142-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,1]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,4]]}},"alternative-id":["142"],"URL":"https:\/\/doi.org\/10.1007\/s13389-016-0142-5","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"value":"2190-8508","type":"print"},{"value":"2190-8516","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11,1]]}}}