Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM
暂无分享,去创建一个
[1] Jean-Louis Lanet,et al. Reverse engineering a Java Card memory management algorithm , 2017, Comput. Secur..
[2] Jean-Louis Lanet,et al. Chronicle of a Java Card death , 2017, Journal of Computer Virology and Hacking Techniques.
[3] Jean-Louis Lanet,et al. The Hell Forgery, Polymorphic Codes Shoot Again , 2016 .
[4] Erik Poll,et al. Logical Attacks on Secured Containers of the Java Card Platform , 2016, CARDIS.
[5] Jean-Louis Lanet,et al. The Hell Forgery - Self Modifying Codes Shoot Again , 2016, CARDIS.
[6] Jean-Louis Lanet,et al. Paper Tigers: An Endless Fight , 2016, SECITC.
[7] Julien Lancia,et al. Java Card Virtual Machine Compromising from a Bytecode Verified Applet , 2015, CARDIS.
[8] Jean-Louis Lanet,et al. Memory Forensics of a Java Card Dump , 2014, CARDIS.
[9] Jean-Louis Lanet,et al. Heap ... Hop! Heap Is Also Vulnerable , 2014, CARDIS.
[10] Jean-Louis Lanet,et al. Reversing the operating system of a Java based smart card , 2014, Journal of Computer Virology and Hacking Techniques.
[11] Jean-Louis Lanet,et al. A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks , 2012, SNDS.
[12] Guillaume Barbu,et al. On the security of Java Card platforms against hardware attacks. (De la sécurité des plateformes Java Card face aux attaques matérielles) , 2012 .
[13] Jean-Louis Lanet,et al. Subverting Byte Code Linker service to characterize Java Card API , 2012 .
[14] Jean-Louis Lanet,et al. Combined Software and Hardware Attacks on the Java Card Control Flow , 2011, CARDIS.
[15] Jean-Louis Lanet,et al. Developing a Trojan applets in a smart card , 2010, Journal in Computer Virology.
[16] Guillaume Barbu,et al. Attacks on Java Card 3.0 Combining Fault and Logical Attacks , 2010, CARDIS.
[17] Rolf Rolles,et al. Unpacking Virtualization Obfuscators , 2009, WOOT.
[18] Gregory R. Andrews,et al. Disassembly of executable code revisited , 2002, Ninth Working Conference on Reverse Engineering, 2002. Proceedings..
[19] Ulrik Pagh Schultz,et al. Java bytecode compression for low-end embedded systems , 2000, TOPL.
[20] Jean-Louis Lanet,et al. Hop ! Heap is also Vulnerable , 2015 .
[21] Nicolas Courtois,et al. The Dark Side of Security by Obscurity - and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime , 2009, SECRYPT.
[22] Gilles Grimaud,et al. Practical Java Card bytecode compression 1 , 2002 .