Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM.
Abdelhak MesbahJean-Louis LanetMohamed MezghichePublished in: Int. J. Inf. Sec. (2019)
Keyphrases
- reverse engineering
- java card
- smart card
- fault injection
- static analysis
- byte code
- countermeasures
- software engineering
- dynamic analysis
- virtual machine
- software maintenance
- object oriented
- elliptic curve
- control flow
- program understanding
- reverse engineer
- gene regulatory networks
- data flow
- security model
- formal specification
- information security
- method invocation
- databases
- integrity constraints
- high level
- case study