{"id":"https://openalex.org/W1984978005","doi":"https://doi.org/10.1109/dsd.2014.51","title":"A Fault Attack Emulation Environment to Evaluate Java Card Virtual-Machine Security","display_name":"A Fault Attack Emulation Environment to Evaluate Java Card Virtual-Machine Security","publication_year":2014,"publication_date":"2014-08-01","ids":{"openalex":"https://openalex.org/W1984978005","doi":"https://doi.org/10.1109/dsd.2014.51","mag":"1984978005"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsd.2014.51","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083130250","display_name":"Michael Lackner","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Michael Lackner","raw_affiliation_strings":["Inst. for Tech. Inf., Graz Univ. of Technol., Graz, Austria"],"affiliations":[{"raw_affiliation_string":"Inst. for Tech. Inf., Graz Univ. of Technol., Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086857998","display_name":"Reinhard Berlach","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Reinhard Berlach","raw_affiliation_strings":["Inst. for Tech. Inf., Graz Univ. of Technol., Graz, Austria"],"affiliations":[{"raw_affiliation_string":"Inst. for Tech. Inf., Graz Univ. of Technol., Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070100312","display_name":"Michael Hraschan","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Michael Hraschan","raw_affiliation_strings":["Inst. for Tech. Inf., Graz Univ. of Technol., Graz, Austria"],"affiliations":[{"raw_affiliation_string":"Inst. for Tech. Inf., Graz Univ. of Technol., Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111468022","display_name":"Reinhold Wei\u00df","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Reinhold Weiss","raw_affiliation_strings":["Inst. for Tech. Inf., Graz Univ. of Technol., Graz, Austria"],"affiliations":[{"raw_affiliation_string":"Inst. for Tech. Inf., Graz Univ. of Technol., Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048811541","display_name":"Christian Steger","orcid":"https://orcid.org/0000-0002-4441-266X"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Christian Steger","raw_affiliation_strings":["Inst. for Tech. Inf., Graz Univ. of Technol., Graz, Austria"],"affiliations":[{"raw_affiliation_string":"Inst. for Tech. Inf., Graz Univ. of Technol., Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.144,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":1,"citation_normalized_percentile":{"value":0.188142,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":66,"max":73},"biblio":{"volume":null,"issue":null,"first_page":"480","last_page":"487"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sandbox","display_name":"Sandbox (software development)","score":0.7285963},{"id":"https://openalex.org/keywords/fault-injection","display_name":"Fault injection","score":0.54369813}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8452734},{"id":"https://openalex.org/C47747970","wikidata":"https://www.wikidata.org/wiki/Q46101","display_name":"Java Card","level":4,"score":0.7423135},{"id":"https://openalex.org/C167981075","wikidata":"https://www.wikidata.org/wiki/Q2667186","display_name":"Sandbox (software development)","level":2,"score":0.7285963},{"id":"https://openalex.org/C15524039","wikidata":"https://www.wikidata.org/wiki/Q865817","display_name":"Java applet","level":3,"score":0.6895355},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.66928524},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.6638303},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.60721946},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.5941459},{"id":"https://openalex.org/C2775928411","wikidata":"https://www.wikidata.org/wiki/Q2041312","display_name":"Fault injection","level":3,"score":0.54369813},{"id":"https://openalex.org/C174954855","wikidata":"https://www.wikidata.org/wiki/Q7623626","display_name":"strictfp","level":4,"score":0.5310018},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.48143265},{"id":"https://openalex.org/C132106392","wikidata":"https://www.wikidata.org/wiki/Q1373903","display_name":"Real time Java","level":3,"score":0.4731689},{"id":"https://openalex.org/C181907185","wikidata":"https://www.wikidata.org/wiki/Q1100098","display_name":"Java concurrency","level":4,"score":0.44007868},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.16915298},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsd.2014.51","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.45,"id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":21,"referenced_works":["https://openalex.org/W1273729602","https://openalex.org/W130444605","https://openalex.org/W1757311817","https://openalex.org/W1786689303","https://openalex.org/W1938655366","https://openalex.org/W196945269","https://openalex.org/W1996024401","https://openalex.org/W2005406402","https://openalex.org/W202225967","https://openalex.org/W2029915748","https://openalex.org/W2040377865","https://openalex.org/W2043085635","https://openalex.org/W2089633241","https://openalex.org/W2111725598","https://openalex.org/W2113494014","https://openalex.org/W2154159026","https://openalex.org/W2166512883","https://openalex.org/W2170489924","https://openalex.org/W2185965879","https://openalex.org/W40479341","https://openalex.org/W9454512"],"related_works":["https://openalex.org/W4226011816","https://openalex.org/W412736943","https://openalex.org/W370370040","https://openalex.org/W2948473269","https://openalex.org/W2737012992","https://openalex.org/W2197133764","https://openalex.org/W2186199411","https://openalex.org/W2131356772","https://openalex.org/W2066931381","https://openalex.org/W197458610"],"abstract_inverted_index":{"Java-enabled":[0],"smart":[1],"cards":[2],"are":[3,97,137,143],"used":[4],"in":[5,99,138],"different":[6],"fields":[7],"of":[8,60,167,171,185,196,220],"application,":[9],"such":[10],"as":[11],"access":[12],"control,":[13],"electronic":[14],"banking,":[15],"and":[16,31,102,132,154,175,189],"passports.":[17],"On":[18],"these":[19,95],"cards,":[20],"a":[21,34,146,209,218,224],"standardized":[22],"virtual":[23,53,116,173],"machine":[24,54,117,174],"runs,":[25],"which":[26,46,51,78,126,133],"protects":[27],"the":[28,48,52,64,100,104,115,119,124,141,150,162,168,172,176,183,194,200],"security-critical":[29,134],"code":[30,73,80,128],"data":[32,49,96],"using":[33,145],"sandbox":[35,39],"model.":[36],"Unfortunately,":[37],"this":[38,61,110],"can":[40],"be":[41],"circumvented":[42],"by":[43,208],"fault":[44,57,197],"attacks,":[45],"corrupt":[47],"on":[50,93,199],"operates.":[55],"The":[56,75,203],"emulation":[58],"environment":[59,113,163,181],"work":[62],"enables":[63,182],"user":[65,76,164],"to":[66,83,89,122,192,223],"configure":[67],"faults":[68,142],"at":[69,149],"definable":[70],"Java":[71,79,127,210],"applet":[72,120],"locations.":[74],"specifies":[77],"she":[81],"wants":[82],"attack":[84],"but":[85],"does":[86],"not":[87],"need":[88],"provide":[90],"any":[91],"information":[92,125],"where":[94],"placed":[98],"memory":[101,105,135,155],"when":[103],"is":[106,129],"accessed.":[107],"To":[108],"enable":[109],"approach,":[111],"our":[112,180],"monitors":[114],"during":[118],"execution":[121],"receive":[123],"currently":[130,186],"executed":[131],"regions":[136],"use.":[139],"Then,":[140],"injected":[144],"bus":[147],"saboteur":[148],"correct":[151],"clock":[152],"cycle":[153],"location.":[156],"This":[157,214],"generic":[158],"high-level":[159],"approach":[160],"provides":[161],"an":[165],"abstraction":[166],"internal":[169],"states":[170],"emulated":[177],"hardware.":[178],"Therefore,":[179],"recreation":[184],"known":[187],"attacks":[188,198],"allows":[190],"us":[191],"study":[193,216],"effects":[195],"virtual-machine":[201],"behavior.":[202],"concept":[204],"was":[205],"successfully":[206],"evaluated":[207],"wallet":[211],"case":[212,215],"study.":[213],"shows":[217],"speedup":[219],"6,600":[221],"compared":[222],"simulation.":[225]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1984978005","counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2025-01-19T04:52:49.587243","created_date":"2016-06-24"}