Attacks on java card 3.0 combining fault and logical attacks

G Barbu, H Thiebeauld, V Guerin - … and Advanced Application: 9th IFIP WG …, 2010 - Springer
Java Cards have been threatened so far by attacks using ill-formed applications which
assume that the application bytecode is not verified. This assumption remained realistic as …

Java card operand stack: fault attacks, combined attacks and countermeasures

G Barbu, G Duc, P Hoogvorst - … and Advanced Applications: 10th IFIP WG …, 2011 - Springer
Abstract Until 2009, Java Cards have been mainly threatened by Logical Attacks based on ill-
formed applications. The publication of the Java Card 3.0 Connected Edition specifications …

Developing a Trojan applets in a smart card

J Iguchi-Cartigny, JL Lanet - Journal in computer virology, 2010 - Springer
This paper presents a method to inject a mutable Java Card applet into a smart card. This
code can on demand parse the memory in order to search for a given pattern and eliminate …

[PDF][PDF] Full memory attack on a Java Card

J Hogenboom, W Mostowski - 2009 - repository.ubn.ru.nl
We present a simple attack on a Java Card smart card to perform arbitrary memory reads.
The attack utilises a known technique of type confusion of the card's Java Virtual Machine by …

On the security of Java Card platforms against hardware attacks

G Barbu - 2012 - pastel.hal.science
Smart cards play a key role in various applications we use on a daily basis: payment, mobile
communication, public transports, etc. In this context, the Java Card technology has evolved …

Logical attacks on secured containers of the Java Card platform

S Volokitin, E Poll - Smart Card Research and Advanced Applications: 15th …, 2017 - Springer
Abstract The Java Card platform provides programmers with API classes that act as
containers for cryptographic keys and PIN codes. This paper presents a first systematic …

Étude de la sécurité d'un vérifieur de Byte Code et génération de tests de vulnérabilité

S Hamadouche - 2012 - pnst.cerist.dz
Résumé Les cartes à puce sont considérées comme étant des supports d'exécution
d'applications et de stockage d'informations très sécurisés. Donc, elles doivent faire face aux …

[PDF][PDF] Évaluation de l'injection de code malicieux dans une Java Card

J Iguchi-Cartigny, JL Lanet - … de l'Information et de la …, 2009 - repository.root-me.org
Résumé Nous avons évalué différentes cartesa puce en vérifiant leur résistancea l'attaque
EMAN qui porte sur une faiblesse d'un composant de la machine virtuelle Java Card: le …

Methodology to reverse engineer a scrambled Java card virtual machine using electromagnetic analysis

MA Kasmi, A Mostafa, JL Lanet - … International Conference on …, 2014 - ieeexplore.ieee.org
ElectroMagnetic Analysis (EMA) of smart cards is a powerful technique that allows extracting
information about the executed code as well as about the processed data. It's why EMA …

Security of micro-controllers: From smart cards to mobile devices

T Razafindralambo - 2016 - theses.hal.science
Nowadays, in order to provide secure, reliable and performant services (eg: mobile
payments, agenda, telecommunication, videos, games, etc.), smartphones embed three …