Login / Signup
: detecting vulnerabilities in Java Card applets.
Léopold Ouairy
Hélène Le Bouder
Jean-Louis Lanet
Published in:
ARES (2020)
Keyphrases
</>
java card
countermeasures
smart card
byte code
information security
fault injection
static analysis
virtual machine
control flow
elliptic curve
security model
computer systems
data flow
security requirements
secret key
security analysis