Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Mesbah, Abdelhak"'
Publikováno v:
In Computers & Security May 2017 66:97-114
Autor:
Mesbah, Abdelhak, Belabed, Zakaria, Tounsi, Abdelouahed, Ghazwani, Mofareh Hassan, Alnujaie, Ali, Aldosari, Salem Mohammed
Publikováno v:
Journal of Vibration Engineering & Technologies; Feb2024, Vol. 12 Issue 2, p2231-2247, 17p
Publikováno v:
Jordanian Journal of Computers & Information Technology; Dec2023, Vol. 9 Issue 4, p328-346, 19p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Emirates Journal for Engineering Research; 2023, Vol. 28 Issue 3, p1-25, 26p
Publikováno v:
International Journal of Information Security. Feb2019, Vol. 18 Issue 1, p85-100. 16p.
Autor:
Lanet, Jean-Louis, Mesbah, Abdelhak
Publikováno v:
Workshop InS3PECT: Ingénierie Système de Services Sécurisés Pour objEts ConnecTé
Workshop InS3PECT: Ingénierie Système de Services Sécurisés Pour objEts ConnecTé, Dec 2017, Nice, France
Workshop InS3PECT: Ingénierie Système de Services Sécurisés Pour objEts ConnecTé, Dec 2017, Nice, France
National audience
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::763043583f1d72711830d29ceecb56c6
https://hal.inria.fr/hal-01645404
https://hal.inria.fr/hal-01645404
Publikováno v:
1st Reversing and Offensive-oriented Trends Symposium 2017
1st Reversing and Offensive-oriented Trends Symposium 2017, Sergey Bratus (Dartmouth College), Nov 2017, Vienna, Austria
1st Reversing and Offensive-oriented Trends Symposium 2017, Sergey Bratus (Dartmouth College), Nov 2017, Vienna, Austria
International audience; Retrieving assets inside a secure element is a challenging task.The most attractive assets are the cryptographic keys storedinto the Non Volatile Memory (NVM) area but also thealgorithms executed. Thus, the confidentiality of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::33c8fd067841aed95065e3c17369eccd
https://hal.inria.fr/hal-01591926
https://hal.inria.fr/hal-01591926
Publikováno v:
The 5th International Conference on Electrical Engineering-ICEE 2017
The 5th International Conference on Electrical Engineering-ICEE 2017, Oct 2017, Boumedrès, Algeria
The 5th International Conference on Electrical Engineering-ICEE 2017, Oct 2017, Boumedrès, Algeria
International audience; Among the protection mechanisms that ensure the Java Card security, the Byte Code Verifier (BCV) is one of the most important security elements. In fact, embedded applets must be verified prior to their installation to prevent
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::31c221ba233b78f59c1346b45c3ec1cc
https://hal.inria.fr/hal-01591931
https://hal.inria.fr/hal-01591931
Publikováno v:
15th Smart Card Research and Advanced Application Conference
15th Smart Card Research and Advanced Application Conference, Aurélien Francillon, Nov 2016, Cannes, France
15th Smart Card Research and Advanced Application Conference, Aurélien Francillon, Nov 2016, Cannes, France
International audience; We present in this paper a new approach to gain access toassets of a smart card. It is based on the concept of reference forgeryand array extension. We characterize the meta data of the system usingdifferent level of expertize
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::36c53ce14e2b129d2e26c7551eb65059
https://hal.inria.fr/hal-01385202
https://hal.inria.fr/hal-01385202