Reverse engineering Java Card and vulnerability exploitation : a shortcut to ROM
| dc.contributor.author | Mesbah, Abdelhak | |
| dc.contributor.author | Lanet, Jean-Louis | |
| dc.contributor.author | Mezghiche, Mohamed | |
| dc.date.accessioned | 2018-04-03T12:51:43Z | |
| dc.date.available | 2018-04-03T12:51:43Z | |
| dc.date.issued | 2017 | |
| dc.identifier.issn | 1615-5262 | |
| dc.identifier.uri | https://dspace.univ-boumerdes.dz/handle/123456789/4648 | |
| dc.language.iso | en | en_US |
| dc.publisher | Springer | en_US |
| dc.relation.ispartofseries | International Journal of Information Security/ (2017);pp 1-16 | |
| dc.subject | Smart card | en_US |
| dc.subject | Java Card | en_US |
| dc.subject | Reverse engineering | en_US |
| dc.subject | Native calls | en_US |
| dc.subject | Vulnerability exploitation | en_US |
| dc.title | Reverse engineering Java Card and vulnerability exploitation : a shortcut to ROM | en_US |
| dc.type | Article | en_US |
