Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM

[1]  Jean-Louis Lanet,et al.  Reverse engineering a Java Card memory management algorithm , 2017, Comput. Secur..

[2]  Jean-Louis Lanet,et al.  Chronicle of a Java Card death , 2017, Journal of Computer Virology and Hacking Techniques.

[3]  Jean-Louis Lanet,et al.  The Hell Forgery, Polymorphic Codes Shoot Again , 2016 .

[4]  Erik Poll,et al.  Logical Attacks on Secured Containers of the Java Card Platform , 2016, CARDIS.

[5]  Jean-Louis Lanet,et al.  The Hell Forgery - Self Modifying Codes Shoot Again , 2016, CARDIS.

[6]  Jean-Louis Lanet,et al.  Paper Tigers: An Endless Fight , 2016, SECITC.

[7]  Julien Lancia,et al.  Java Card Virtual Machine Compromising from a Bytecode Verified Applet , 2015, CARDIS.

[8]  Jean-Louis Lanet,et al.  Memory Forensics of a Java Card Dump , 2014, CARDIS.

[9]  Jean-Louis Lanet,et al.  Heap ... Hop! Heap Is Also Vulnerable , 2014, CARDIS.

[10]  Jean-Louis Lanet,et al.  Reversing the operating system of a Java based smart card , 2014, Journal of Computer Virology and Hacking Techniques.

[11]  Jean-Louis Lanet,et al.  A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks , 2012, SNDS.

[12]  Guillaume Barbu,et al.  On the security of Java Card platforms against hardware attacks. (De la sécurité des plateformes Java Card face aux attaques matérielles) , 2012 .

[13]  Jean-Louis Lanet,et al.  Subverting Byte Code Linker service to characterize Java Card API , 2012 .

[14]  Jean-Louis Lanet,et al.  Combined Software and Hardware Attacks on the Java Card Control Flow , 2011, CARDIS.

[15]  Jean-Louis Lanet,et al.  Developing a Trojan applets in a smart card , 2010, Journal in Computer Virology.

[16]  Guillaume Barbu,et al.  Attacks on Java Card 3.0 Combining Fault and Logical Attacks , 2010, CARDIS.

[17]  Rolf Rolles,et al.  Unpacking Virtualization Obfuscators , 2009, WOOT.

[18]  Gregory R. Andrews,et al.  Disassembly of executable code revisited , 2002, Ninth Working Conference on Reverse Engineering, 2002. Proceedings..

[19]  Ulrik Pagh Schultz,et al.  Java bytecode compression for low-end embedded systems , 2000, TOPL.

[20]  Jean-Louis Lanet,et al.  Hop ! Heap is also Vulnerable , 2015 .

[21]  Nicolas Courtois,et al.  The Dark Side of Security by Obscurity - and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime , 2009, SECRYPT.

[22]  Gilles Grimaud,et al.  Practical Java Card bytecode compression 1 , 2002 .