Persistent fault injection attack from white-box to black-box
暂无分享,去创建一个
Jean-Louis Lanet | Mohamed Mezghiche | Abdelhak Mesbah | Jean-Louis Lanet | M. Mezghiche | A. Mesbah
[1] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[2] Guillaume Barbu,et al. Attacks on Java Card 3.0 Combining Fault and Logical Attacks , 2010, CARDIS.
[3] Jean-Louis Lanet,et al. Combined Software and Hardware Attacks on the Java Card Control Flow , 2011, CARDIS.
[4] Jean-Louis Lanet,et al. The ultimate control flow transfer in a Java based smart card , 2015, Comput. Secur..
[5] Marc F. Witteman,et al. Reverse Engineering Java Card Applets Using Power Analysis , 2007, WISTP.
[6] Jean-Pierre Seifert,et al. A new CRT-RSA algorithm secure against bellcore attacks , 2003, CCS '03.
[7] Jean-Louis Lanet,et al. The Hell Forgery - Self Modifying Codes Shoot Again , 2016, CARDIS.
[8] Ross J. Anderson,et al. Optical Fault Induction Attacks , 2002, CHES.
[9] Eric Vétillard,et al. Combined Attacks and Countermeasures , 2010, CARDIS.
[10] Jean-Louis Lanet,et al. Reverse engineering a Java Card memory management algorithm , 2017, Comput. Secur..
[11] Erik Poll,et al. Logical Attacks on Secured Containers of the Java Card Platform , 2016, CARDIS.
[12] David Naccache,et al. The Sorcerer's Apprentice Guide to Fault Attacks , 2006, Proceedings of the IEEE.
[13] Julien Lancia,et al. Java Card Virtual Machine Compromising from a Bytecode Verified Applet , 2015, CARDIS.