Garbage Collector Gets Confused. In Barthe, G. and
Livshits, B., editors, International Symposium on En-
gineering Secure Software and Systems – ESSoS 2012,
Lecture Notes in Computer Science. Springer.
Barbu, G. and Thiebeauld, H. (2011). Synchronized Attacks
on Multithreaded Systems - Application to Java Card
3.0 -. In (Prouff, 2011), pages 18–33.
Barbu, G., Thiebeauld, H., and Guerin, V. (2010). Attacks
on Java Card 3.0 Combining Fault and Logical At-
tacks. In (Gollmann and Lanet, 2010), pages 148–163.
Caromel, D. and Vayssi`ere, J. (2001). Reflection on MOPs,
Components, and Java Security. In Proceedings
of the Engineering C of Object-Oriented Programs
(ECOOP), volume 2072 of LNCS. Springer-Verlag.
Chen, Z. (2000). Java Card Technology for Smart Cards,
Architecture and Programmer’s Guide. Addison-
Wesley.
Cholakov, N. and Milev, D. (2005). The Evolution of the
Java Security Model. In Proceedings of the Inter-
national Conference on Computer Systems and Tech-
nologies (CompSysTech’2005).
Dean, D., Felten, E. W., and Wallach, D. S. (1996). Java
Security: From HotJava to Netscape and Beyond. In
Proceedings of the IEEE Symposium on Security and
Privacy.
Giraud, C. and Thiebeauld, H. (2004). A Survey on Fault
Attacks. In Quisquater, J.-J., Paradinas, P., Deswarte,
Y., and Kalam, A. E., editors, Smart Card Research
and Advanced Applications VI – CARDIS 2004, pages
159–176. Kluwer Academic Publishers.
Gollmann, D. and Lanet, J.-L., editors (2010). volume 6035
of Lecture Notes in Computer Science. Springer.
Gosling, J., Joy, B., Steele, G., and Bracha, G. (2005). The
Java Language Specification. Addiosn-Wesley, 3rd
edition.
Govindavajhala, S. and Appel, A. (2003). Using Memory
Errors to Attack a Virtual Machine. In IEEE Sympo-
sium on Security and Privacy, pages 154–165. IEEE
Computer Society.
Gutterman, Z. and Malkhi, D. (2005). Hold Your Sessions:
An Attack on Java Session-Id Generation. In Proceed-
ings of the Cryptographer’s Track at the RSA Confer-
ence (CT-RSA), LNCS. Springer.
Hubert, L., Jensen, T., Monfort, V., and Pichardie, D.
(2010). Enforcing Secure Object Initialization in
Java. In Proceedings of the European Symposium on
Research in Computer Securiy, ESORICS’10, pages
101–115. Springer-Verlag.
Ladue, M. D. (1997). When Java was One: Threats from
Hostile Bytecode. In Proceedings of the 20th National
Information Systems Security Conference, pages 104–
115.
Last Stage of Delirium Research Group (2002). Java
and Java Virtual Machine Security Vulnerabilities and
their Exploitation Techniques. In BlackHat Confer-
ence.
Lindholm, T. and Yellin, F. (1999). Java Virtual Machine
Specification. Addison-Wesley, Inc., 2nd edition.
Livshits, B. and Lam, M. S. (2005). Finding Security Vul-
nerabilities in Java Applications with Static Analysis.
Technical report, USENIX.
Long, F., Mohlndra, D., Seacord, R. C., Sutherland, D. F.,
and Svoboda, D. (2011). The CERT Oracle Secure
Coding Standard for Java. Carnegie Mellon Software
Engineering Institue (SEI) series. Addison-Wesley.
McGraw, G. and Felten, E. W. (2000). Getting Down to
Business with Mobile Code. John Wiley & Sons.
Mehta, N. V. and Sollins, K. R. (1998). Expanding and Ex-
tending the Security Features of Java. In Proceedings
of the 7th USENIX Security Symposium.
Mostowski, W. and Poll, E. (2008). Malicious Code on
Java Card Smartcards: Attacks and Countermeasures.
In Grimaud, G. and Standaert, F.-X., editors, Smart
Card Research and Advanced Applications, 8th Inter-
national Conference – CARDIS 2008, volume 5189
of Lecture Notes in Computer Science, pages 1–16.
Springer.
Oaks, S. (2001). Java Security. O’Reilly, second edition.
Princeton University, Department of Computer Science, Se-
cure Internet Programming Group. Reports on Secu-
rity Flaws in Commercial Available Softwares.
Prouff, E., editor (2011). volume 7079 of Lecture Notes in
Computer Science. Springer.
Quisquater, J.-J. and Samyde, D. (2002). Eddy Current for
Magnetic Analysis with Active Sensor. In e-Smart
2002.
S´er´e, A. A. K., Iguchi-Cartigny, J., and Lanet, J.-L. (2009).
Automatic Detection of Fault Attack and Countermea-
sures. In Proceedings of the 4th Workshop on Embed-
ded Systems Security, WESS ’09, pages 1–7.
S´er´e, A. A. K., Iguchi-Cartigny, J., and Lanet, J.-L. (2010).
Checking the Paths to Identify Mutant Application on
Embedded Systems. In FGIT, pages 459–468.
Skorobogatov, S. and Anderson, R. (2002). Optical Fault
Induction Attack. In Kaliski Jr., B., Koc¸, C¸ ., and Paar,
C., editors, Cryptographic Hardware and Embedded
Systems – CHES 2002, volume 2523 of Lecture Notes
in Computer Science, pages 2–12. Springer.
Sun Microsystems (2006). Virtual Machine Specification –
Java Card
TM
Plateform, Version 2.2.2.
Sun Microsystems Inc. (2009a). Application Programming
Interface, Java Card Platform, Version 3.0.1 Con-
nected Edition.
Sun Microsystems Inc. (2009b). Runtime Environment
Specification, Java Card Platform, Version 3.0.1 Con-
nected Edition.
Sun Microsystems Inc. (2009c). Virtual Machine Specifica-
tion – Java Card Plateform, Version 3.0.1.
The Open Web Application Security Project (OWASP)
(2012a). Information Leakage.
The Open Web Application Security Project (OWASP)
(2012b). Uncaught Exceptions.
V´etillard, E. and Ferrari, A. (2010). Combined Attacks and
Countermeasures. In (Gollmann and Lanet, 2010),
pages 133–147.
Witteman, M. (2003). Java Card Security. In Information
Security Bulletin, volume 8, pages 291–298.
TamperingwithJavaCardExceptions-TheExceptionProvestheRule
63