{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:33:04Z","timestamp":1729675984476,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/isias.2015.7492753","type":"proceedings-article","created":{"date-parts":[[2016,6,16]],"date-time":"2016-06-16T20:14:55Z","timestamp":1466108095000},"page":"104-110","source":"Crossref","is-referenced-by-count":0,"title":["Side channel analysis techniques towards a methodology for reverse engineering of Java Card byte-code"],"prefix":"10.1109","author":[{"given":"Mohammed Amine","family":"Kasmi","sequence":"first","affiliation":[]},{"given":"Mostafa","family":"Azizi","sequence":"additional","affiliation":[]},{"given":"Jean-Louis","family":"Lanet","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"13","article-title":"Template attacks","author":"suresh","year":"2003","journal-title":"Cryptographic Hardware and Embedded Systems-CHES 2002"},{"year":"2008","author":"martin","journal-title":"Side-channel based reverse engineering for microcontrollers","key":"ref11"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/s11416-014-0218-7","article-title":"Reversing the operating system of a Java based smart card","volume":"10","author":"guillaume","year":"2014","journal-title":"Journal of Computer Virology and Hacking Techniques"},{"key":"ref13","first-page":"440","article-title":"Practical template attacks","author":"christian","year":"2005","journal-title":"Information Security Applications"},{"key":"ref14","article-title":"Louis, Methodology To Reverse Engineer A Javacard Applet using Pattern Matching Attack","volume":"10","author":"mohammed amine","year":"2015","journal-title":"published in International Journal of Applied Engineering Research(IJAER)"},{"key":"ref4","article-title":"Smart card reverse-engineering binary code execution using side-channel analysis","author":"fran\u00e7ois-xavier","year":"2012","journal-title":"Thorie des Nombres Codes Cryptographic et Systmes de Communication (NTCCCS)"},{"key":"ref3","first-page":"138","article-title":"N. Reverse engineering java card applets using power analysis","author":"dennis","year":"2007","journal-title":"Information Security Theory and Practices Smart Cards Mobile and Ubiquitous Computing Systems"},{"key":"ref6","first-page":"251","article-title":"Electromagnetic analysis: Concrete results","author":"karine","year":"2001","journal-title":"Cryptographic Hardware and Embedded Systems CHES 2001"},{"year":"2012","author":"guillaume","article-title":"On the security of Java Card platforms against hardware attacks","key":"ref5"},{"key":"ref8","first-page":"200","article-title":"Electromagnetic analysis (ema): Measures and counter-measures for smart cards","author":"jean-jacques","year":"2001","journal-title":"Smart Card Programming and Security"},{"key":"ref7","first-page":"471","article-title":"Characterization of the electromagnetic side channel in frequency domain","author":"olivier","year":"2011","journal-title":"Information Security and Cryptology"},{"key":"ref2","first-page":"388","article-title":"Differential power analysis","author":"paul","year":"1999","journal-title":"Advances in Cryptology&#x2014;CRYPTO'99"},{"year":"2011","journal-title":"Version 3 0 4 Oracle Oracle America Inc 500 Oracle Parkway","article-title":"Oracle: Java Card 3 Platform, Virtual Machine Specification, Classic Edition","key":"ref1"},{"key":"ref9","article-title":"Automated reverse engineering method on embedded systems","author":"aranda","year":"2011","journal-title":"Proceedings of the Congress of CRYPTO'PUCES 2011 Limoges France"}],"event":{"name":"2015 11th International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2015,12,14]]},"location":"Marrakech, Morocco","end":{"date-parts":[[2015,12,16]]}},"container-title":["2015 11th International Conference on Information Assurance and Security (IAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7484378\/7492733\/07492753.pdf?arnumber=7492753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T12:31:43Z","timestamp":1498307503000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7492753\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/isias.2015.7492753","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}