{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:33Z","timestamp":1750306833807,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,1,20]],"date-time":"2014-01-20T00:00:00Z","timestamp":1390176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004956","name":"Bundesministerium f\u00fcr Verkehr, Innovation und Technologie","doi-asserted-by":"publisher","award":["FIT-IT contract FFG 830601"],"award-info":[{"award-number":["FIT-IT contract FFG 830601"]}],"id":[{"id":"10.13039\/501100004956","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,1,20]]},"DOI":"10.1145\/2556315.2556317","type":"proceedings-article","created":{"date-parts":[[2014,1,14]],"date-time":"2014-01-14T13:40:06Z","timestamp":1389706806000},"page":"19-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Countering type confusion and buffer overflow attacks on Java smart cards by data type sensitive obfuscation"],"prefix":"10.1145","author":[{"given":"Michael","family":"Lackner","sequence":"first","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"given":"Reinhard","family":"Berlach","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"given":"Reinhold","family":"Weiss","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"given":"Christian","family":"Steger","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]}],"member":"320","published-online":{"date-parts":[[2014,1,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27257-8_19"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12510-2_11"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIAS.2010.5604061"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2188769"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27257-8_18"},{"key":"e_1_3_2_1_6_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/978-3-642-28368-0_26","volume-title":"Cryptography and Security: From Theory to Applications","author":"Bouffard G.","year":"2012","unstructured":"G. Bouffard and J.-L. Lanet . The Next Smart Card Nightmare . In D. Naccache, editor, Cryptography and Security: From Theory to Applications , volume 6805 of Lecture Notes in Computer Science , pages 405 -- 424 . Springer Berlin\/Heidelberg , 2012 . G. Bouffard and J.-L. Lanet. The Next Smart Card Nightmare. In D. Naccache, editor, Cryptography and Security: From Theory to Applications, volume 6805 of Lecture Notes in Computer Science, pages 405--424. Springer Berlin\/Heidelberg, 2012."},{"key":"e_1_3_2_1_7_1","volume-title":"International Journal of Secure Software Engineering (IJSSE), 4(2):19--39","author":"Dubreuil J.","year":"2013","unstructured":"J. Dubreuil , G. Bouffard , B. N. Thampi , and J.-L. Lanet . Mitigating Type Confusion on Java Card . International Journal of Secure Software Engineering (IJSSE), 4(2):19--39 , 2013 . J. Dubreuil, G. Bouffard, B. N. Thampi, and J.-L. Lanet. Mitigating Type Confusion on Java Card. International Journal of Secure Software Engineering (IJSSE), 4(2):19--39, 2013."},{"key":"e_1_3_2_1_8_1","first-page":"122","volume-title":"Proceedings of the 7th Conference on Network and Information Systems Security (SAR-SSI)","author":"Hamadouche S.","year":"2012","unstructured":"S. Hamadouche , G. Bouffard , J.-L. Lanet , B. Dorsemaine , B. Nouhant , A. Magloire , and A. Reygnaud . Subverting Byte Code Linker service to characterize Java Card API . Proceedings of the 7th Conference on Network and Information Systems Security (SAR-SSI) , pages 122 -- 128 . 2012 . S. Hamadouche, G. Bouffard, J.-L. Lanet, B. Dorsemaine, B. Nouhant, A. Magloire, and A. Reygnaud. Subverting Byte Code Linker service to characterize Java Card API. Proceedings of the 7th Conference on Network and Information Systems Security (SAR-SSI), pages 122--128. 2012."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-009-0135-3"},{"volume-title":"International Conference on Risks and Security of Internet and Systems (CRiSIS).","author":"Lackner M.","key":"e_1_3_2_1_10_1","unstructured":"M. Lackner , R. Berlach , M. Hraschan , R. Weiss , and C. Steger . A Defensive Java Card Virtual Machine to Thwart Fault Attacks by Microarchitectural Support . In International Conference on Risks and Security of Internet and Systems (CRiSIS). in press, 2013. M. Lackner, R. Berlach, M. Hraschan, R. Weiss, and C. Steger. A Defensive Java Card Virtual Machine to Thwart Fault Attacks by Microarchitectural Support. In International Conference on Risks and Security of Internet and Systems (CRiSIS). in press, 2013."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37288-9_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/978-3-642-38530-8_6","volume-title":"Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems","author":"Lackner M.","year":"2013","unstructured":"M. Lackner , R. Berlach , W. Raschke , R. Weiss , and C. Steger . A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards . In Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems , pages 82 -- 97 . Springer , 2013 . M. Lackner, R. Berlach, W. Raschke, R. Weiss, and C. Steger. A Defensive Virtual Machine Layer to Counteract Fault Attacks on Java Cards. In Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, pages 82--97. Springer, 2013."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2013.39"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85893-5_1"},{"volume-title":"Version 3.0.4","year":"2011","key":"e_1_3_2_1_15_1","unstructured":"Oracle. Runtime Environment Specification. Java Card Platform , Version 3.0.4 , Classic Edition , 2011 . Oracle. Runtime Environment Specification. Java Card Platform, Version 3.0.4, Classic Edition, 2011."},{"volume-title":"Version 3.0.4","year":"2011","key":"e_1_3_2_1_16_1","unstructured":"Oracle. Virtual Machine Specification. Java Card Platform , Version 3.0.4 , Classic Edition , 2011 . Oracle. Virtual Machine Specification. Java Card Platform, Version 3.0.4, Classic Edition, 2011."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34135-9_19"},{"key":"e_1_3_2_1_18_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1007\/978-3-642-17569-5_45","volume-title":"T.-h. Kim, Y.-h. Lee, B.-H","author":"Sere A.","year":"2010","unstructured":"A. Sere , J. Iguchi-Cartigny , and J.-L. Lanet . Checking the Paths to Identify Mutant Application on Embedded Systems . In T.-h. Kim, Y.-h. Lee, B.-H . Kang, and D. Slezak, editors, Future Generation Information Technology, volume 6485 of Lecture Notes in Computer Science , pages 459 -- 468 . Springer Berlin\/Heidelberg , 2010 . A. Sere, J. Iguchi-Cartigny, and J.-L. Lanet. Checking the Paths to Identify Mutant Application on Embedded Systems. In T.-h. Kim, Y.-h. Lee, B.-H. Kang, and D. Slezak, editors, Future Generation Information Technology, volume 6485 of Lecture Notes in Computer Science, pages 459--468. Springer Berlin\/Heidelberg, 2010."},{"key":"e_1_3_2_1_19_1","volume-title":"International Journal of Security and Its Applications","volume":"5","author":"Sere A.","year":"2011","unstructured":"A. Sere , J. Iguchi-Cartigny , and J.-L. Lanet . Evaluation of Countermeasures Against Fault Attacks on Smart Cards . International Journal of Security and Its Applications , Vol. 5 No.2, pages 49- -61, April 2011 . A. Sere, J. Iguchi-Cartigny, and J.-L. Lanet. Evaluation of Countermeasures Against Fault Attacks on Smart Cards. International Journal of Security and Its Applications, Vol.5 No.2, pages 49--61, April 2011."},{"key":"e_1_3_2_1_20_1","volume-title":"White Paper","author":"Sun Microsystems Inc.","year":"2002","unstructured":"Sun Microsystems Inc. Java Card 2.2 Off-card Verifier . White Paper , June 2002 . Sun Microsystems Inc. Java Card 2.2 Off-card Verifier. White Paper, June 2002."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11889700_21"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12510-2_10"}],"event":{"name":"CS2: Cryptography and Security in Computing Systems","sponsor":["HiPEAC HiPEAC Network of Excellence"],"location":"Vienna Austria","acronym":"CS2"},"container-title":["Proceedings of the First Workshop on Cryptography and Security in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2556315.2556317","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2556315.2556317","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:09:53Z","timestamp":1750234193000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2556315.2556317"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1,20]]},"references-count":22,"alternative-id":["10.1145\/2556315.2556317","10.1145\/2556315"],"URL":"https:\/\/doi.org\/10.1145\/2556315.2556317","relation":{},"subject":[],"published":{"date-parts":[[2014,1,20]]},"assertion":[{"value":"2014-01-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}