Java card operand stack: fault attacks, combined attacks and countermeasures

G Barbu, G Duc, P Hoogvorst - … and Advanced Applications: 10th IFIP WG …, 2011 - Springer
Abstract Until 2009, Java Cards have been mainly threatened by Logical Attacks based on ill-
formed applications. The publication of the Java Card 3.0 Connected Edition specifications …

Embedded eavesdrop** on java card

G Barbu, C Giraud, V Guerin - … Security and Privacy Research: 27th IFIP …, 2012 - Springer
In this article we present the first Combined Attack on a Java Card targeting the APDU buffer
itself, thus threatening both the security of the platform and of the hosted applications as well …

A generic approach for protecting java card™ smart card against software attacks

G Bouffard - 2014 - theses.hal.science
Smart cards are the keystone of various applications which we daily use: pay money for
travel, phone, etc. To improve the security of this device with a friendly development …

Chronicle of a Java Card death

M Farhadi, JL Lanet - Journal of Computer Virology and Hacking …, 2017 - Springer
Various attacks are designed to gain access to the assets of Java Card Platforms. These
attacks use software, hardware or a combination of both. Manufacturers have improved their …

On the security of Java Card platforms against hardware attacks

G Barbu - 2012 - pastel.hal.science
Smart cards play a key role in various applications we use on a daily basis: payment, mobile
communication, public transports, etc. In this context, the Java Card technology has evolved …

Application-replay attack on Java Cards: when the garbage collector gets confused

G Barbu, P Hoogvorst, G Duc - … , The Netherlands, February, 16-17, 2012 …, 2012 - Springer
Java Card 3.0 specifications have brought many new features in the Java Card world,
amongst which a true garbage collection mechanism. In this paper, we show how one could …

Logical attacks on secured containers of the Java Card platform

S Volokitin, E Poll - Smart Card Research and Advanced Applications: 15th …, 2017 - Springer
Abstract The Java Card platform provides programmers with API classes that act as
containers for cryptographic keys and PIN codes. This paper presents a first systematic …

Reverse engineering a Java Card memory management algorithm

A Mesbah, JL Lanet, M Mezghiche - computers & security, 2017 - Elsevier
Smart cards are tamper resistant devices that manipulate assets in a secure way. Among the
assets, one is of a particular interest the native layers. If some attacks have succeeded in …

Synchronized attacks on multithreaded systems-application to java card 3.0

G Barbu, H Thiebeauld - Smart Card Research and Advanced Applications …, 2011 - Springer
Up to now devices in charge of performing secure transactions mainly remained limited
regarding their functionalities. However the trend has recently gone towards an increasing …

Detecting attacks on java cards by fingerprinting applets

G Morana, E Tramontana, D Zito - 2013 Workshops on …, 2013 - ieeexplore.ieee.org
Differently from classical JVMs, generally JavaCard Virtual Machines (JCVMs) rely only on
limited amount of resources typical of smart cards. Recently, several mixes of logical and …