2016
DOI: 10.1007/s11416-016-0276-0
|View full text |Cite
|
Sign up to set email alerts
|

Chronicle of a Java Card death

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…2, namely -modifying metadata (esp. of arrays), -'spoofing' references (by doing some pointer arithmetic), -using getstatic b, -using 'illegal' opcodes, in a variation of the attack of [9], and -accessing arbitrary objects as if they were arrays (effectively a generalisation of the attack with arrayCopyNonAtomic used in [5] 2 ).…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…2, namely -modifying metadata (esp. of arrays), -'spoofing' references (by doing some pointer arithmetic), -using getstatic b, -using 'illegal' opcodes, in a variation of the attack of [9], and -accessing arbitrary objects as if they were arrays (effectively a generalisation of the attack with arrayCopyNonAtomic used in [5] 2 ).…”
Section: Discussionmentioning
confidence: 99%
“…The only paper in the literature that looks at secure containers is by Farhadi and Lanet [5]. Here an attack is presented to access the plaintext value of a 3DES key belonging to another applet.…”
Section: Background and Related Workmentioning
confidence: 99%
See 2 more Smart Citations