Side channel analysis techniques towards a methodology for reverse engineering of Java Card byte-code
暂无分享,去创建一个
[1] Henk L. Muller,et al. Cryptographic Hardware and Embedded Systems — CHES 2001 , 2001, Lecture Notes in Computer Science.
[2] Marc F. Witteman,et al. Reverse Engineering Java Card Applets Using Power Analysis , 2007, WISTP.
[3] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[4] Olivier Meynard,et al. Characterization of the Electromagnetic Side Channel in Frequency Domain , 2010, Inscrypt.
[5] Pankaj Rohatgi,et al. Template Attacks , 2002, CHES.
[6] Guillaume Barbu,et al. On the security of Java Card platforms against hardware attacks. (De la sécurité des plateformes Java Card face aux attaques matérielles) , 2012 .
[7] Jean-Louis Lanet,et al. Reversing the operating system of a Java based smart card , 2014, Journal of Computer Virology and Hacking Techniques.
[8] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[9] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[10] Elisabeth Oswald,et al. Practical Template Attacks , 2004, WISA.