Evaluation of the Ability to Transform SIM Applications into Hostile Applications
暂无分享,去创建一个
Jean-Louis Lanet | Guillaume Bouffard | Jean-Philippe Wary | Jean-Baptiste Machemie | Jean-Yves Poichotte | Jean-Louis Lanet | Jean-Philippe Wary | Guillaume Bouffard | Jean-Baptiste Machemie | Jean-Yves Poichotte
[1] Louis Goubin,et al. Automatic Integration of Counter-Measures Against Fault Injection Attacks , 2003 .
[2] Ludger Hemme,et al. A Differential Fault Attack Against Early Rounds of (Triple-)DES , 2004, CHES.
[3] Wieland Fischer,et al. Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures , 2002, CHES.
[4] David Naccache,et al. The Sorcerer's Apprentice Guide to Fault Attacks , 2006, Proceedings of the IEEE.
[5] Jean-Louis Lanet,et al. Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings , 2010, CARDIS.
[6] Jean-Louis Lanet,et al. Automatic detection of fault attack and countermeasures , 2009, WESS '09.
[7] David A. Wagner,et al. Cryptanalysis of a provably secure CRT-RSA algorithm , 2004, CCS '04.
[8] Jean-Pierre Seifert,et al. A new CRT-RSA algorithm secure against bellcore attacks , 2003, CCS '03.
[9] Ross J. Anderson,et al. Optical Fault Induction Attacks , 2002, CHES.
[10] Michael F. P. O'Boyle,et al. Using machine learning to focus iterative optimization , 2006, International Symposium on Code Generation and Optimization (CGO'06).
[11] Guillaume Barbu,et al. Attacks on Java Card 3.0 Combining Fault and Logical Attacks , 2010, CARDIS.
[12] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.
[13] David I. August,et al. SWIFT: software implemented fault tolerance , 2005, International Symposium on Code Generation and Optimization.
[14] Jean-Louis Lanet,et al. Developing a Trojan applets in a smart card , 2010, Journal in Computer Virology.
[15] Jack W. Davidson,et al. Safe virtual execution using software dynamic translation , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[16] Jean-Jacques Quisquater,et al. A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD , 2003, CHES.
[17] Jean-Louis Lanet,et al. Combined Software and Hardware Attacks on the Java Card Control Flow , 2011, CARDIS.
[18] Martín Abadi,et al. Control-flow integrity , 2005, CCS '05.
[19] Christof Paar,et al. Cryptographic Hardware and Embedded Systems - CHES 2003 , 2003, Lecture Notes in Computer Science.
[20] Edward J. McCluskey,et al. Control-flow checking by software signatures , 2002, IEEE Trans. Reliab..
[21] Ims Restoration Procedures. 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; , 2008 .
[22] Marc Joye,et al. Cryptographic Hardware and Embedded Systems - CHES 2004 , 2004, Lecture Notes in Computer Science.
[23] Eric Vétillard,et al. Combined Attacks and Countermeasures , 2010, CARDIS.