2013 International Conference on Risks and Security of Internet and Systems (CRiSIS) 2013
DOI: 10.1109/crisis.2013.6766360
|View full text |Cite
|
Sign up to set email alerts
|

A defensive Java Card virtual machine to thwart fault attacks by microarchitectural support

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2015
2015

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Girand and his copartners proposed a level object sharing mechanism based on partial sequence grid [9]. In order to control the flow of data, you can specify a level for all objects generated by the card application, the data information can only flow from a low level applet object to a high level of object in java card.…”
Section: Analysis Of Other Methodsmentioning
confidence: 99%
“…Girand and his copartners proposed a level object sharing mechanism based on partial sequence grid [9]. In order to control the flow of data, you can specify a level for all objects generated by the card application, the data information can only flow from a low level applet object to a high level of object in java card.…”
Section: Analysis Of Other Methodsmentioning
confidence: 99%
“…There is a vast literature regarding attacks of various nature against smart card and more specifically against Java Card. The control-flow attacks category is one of the categories that affects the Java interpreter [21,22]. As Fig.…”
Section: Bounds Checkmentioning
confidence: 98%
“…However, run-time rather than static approaches have also been proposed to achieve similar advantages in the context of bytecode execution on Java smart cards. Lackner et al proposed to adapt the virtual machine (VM) that interprets the bytecode to inject the necessary redundancy in the executed code [27,28]. By duplicating code at run time, they achieve the same goal of providing protection without interfering with the software development cycle.…”
Section: Related Workmentioning
confidence: 99%