共 50 条
- [1] Java card operand stack: Fault attacks, combined attacks and countermeasures Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, 7079 : 297 - 313
- [3] Attacks on Java']Java Card 3.0 Combining Fault and Logical Attacks SMART CARD RESEARCH AND ADVANCED APPLICATION, PROCEEDINGS, 2010, 6035 : 148 - 163
- [5] Logical Attacks on Secured Containers of the Java']Java Card Platform SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2016, 2017, 10146 : 122 - 136
- [6] Malicious code on Java']Java Card smartcards: Attacks and countermeasures SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2008, 5189 : 1 - 16
- [7] Generating Control Flow Graph from Java']Java Card Byte Code 2014 THIRD IEEE INTERNATIONAL COLLOQUIUM IN INFORMATION SCIENCE AND TECHNOLOGY (CIST'14), 2014, : 206 - 212
- [8] Three control flow obfuscation methods for Java']Java software IEE PROCEEDINGS-SOFTWARE, 2006, 153 (02): : 80 - 86
- [9] Specification and integration of software and reconfigurable hardware using Hardware Join Java']Java 2003 IEEE INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (FPT), PROCEEDINGS, 2003, : 379 - 382
- [10] Concurrent hardware/software coverification with Java']Java threads PAR ELEC 2002: INTERNATIONAL CONFERENCE ON PARALLEL COMPUTING IN ELECTRICAL ENGINEERING, 2002, : 95 - 98