{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:53:19Z","timestamp":1729673599163,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/crisis.2013.6766360","type":"proceedings-article","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T15:00:43Z","timestamp":1395327643000},"page":"1-8","source":"Crossref","is-referenced-by-count":6,"title":["A defensive Java Card virtual machine to thwart fault attacks by microarchitectural support"],"prefix":"10.1109","author":[{"given":"Michael","family":"Lackner","sequence":"first","affiliation":[]},{"given":"Reinhard","family":"Berlach","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Hraschan","sequence":"additional","affiliation":[]},{"given":"Reinhold","family":"Weiss","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Steger","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"49","article-title":"Evaluation of countermea-sures against fault attacks on smart cards","volume":"5","author":"sere","year":"2011","journal-title":"International Journal of Security and its Applications"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862424"},{"key":"18","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","article-title":"Differential fault analysis of secret key cryptosystems","author":"biham","year":"1997","journal-title":"Advances in CryptologyCRYPTO'97"},{"key":"15","first-page":"388","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Advances in CryptologyCRYPT095"},{"key":"16","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/3-540-45418-7_17","article-title":"Electromagnetic analysis (ema):Measures and counter-measures for smart cards","author":"quisquater","year":"2001","journal-title":"Smart Card Programming and Security"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12510-2_11"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27257-8_18"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/11889700_21"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17569-5_45"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37288-9_1"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31540-4_10"},{"journal-title":"De la Securite des Plateformes Java Card Face Aux Attaques Materielles","year":"2012","author":"barbu","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27257-8_2"},{"year":"0","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-009-0135-3"},{"key":"26","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/978-3-642-28368-0_26","article-title":"The next smart card nightmare","volume":"6805","author":"bouffard","year":"2012","journal-title":"Cryptography and Security From Theory to Applications"},{"year":"0","key":"3"},{"key":"2","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1002\/spe.438","article-title":"Bytecode verification on java smart cards","volume":"32","author":"leroy","year":"2002","journal-title":"Software Practice and Experience"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2012.24"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2012.149"},{"key":"7","first-page":"122","article-title":"Subverting byte code linker service to characterize java card api","author":"hamadouche","year":"2012","journal-title":"Proceedings of the 7th Conference on Network and Information Systems Security (SAR-SSI"},{"key":"6","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/978-3-642-27257-8_19","article-title":"Java card operand stack:fault attacks, combined attacks and countermeasures","volume":"7079","author":"barbu","year":"2011","journal-title":"Smart Card Research and Advanced Applications"},{"key":"5","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/978-3-642-12510-2_10","article-title":"Combined attacks and countermeasures","volume":"6035","author":"vetillard","year":"2010","journal-title":"Smart Card Research and Advanced Application"},{"year":"0","key":"4"},{"key":"9","article-title":"Advances in smartcard security","author":"witteman","year":"2002","journal-title":"Information Security Bulletin"},{"key":"8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-85893-5_1","article-title":"Malicious code on java card smartcards:Attacks and countermeasures","volume":"5189","author":"mostowski","year":"2008","journal-title":"Smart Card Research and Advanced Applications"}],"event":{"name":"2013 International Conference on Risks and Security of Internet and Systems (CRiSIS)","start":{"date-parts":[[2013,10,23]]},"location":"La Rochelle, France","end":{"date-parts":[[2013,10,25]]}},"container-title":["2013 International Conference on Risks and Security of Internet and Systems (CRiSIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6749561\/6766339\/06766360.pdf?arnumber=6766360","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T06:00:36Z","timestamp":1498111236000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6766360\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/crisis.2013.6766360","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}