A Redundancy-Based Attack Detection Technique for Java Card Bytecode.
Rosario GiuntaGiuseppe PappalardoEmiliano TramontanaPublished in: WETICE (2014)
Keyphrases
- java card
- attack detection
- smart card
- multistage
- countermeasures
- cyber attacks
- fault injection
- static analysis
- intrusion detection system
- virtual machine
- information security
- security model
- elliptic curve
- data flow
- control flow
- product recommendation
- dynamic programming
- security requirements
- method invocation
- high level
- network traffic
- data analysis