Hiding a fault enabled virus through code construction

Smart cards are very secure devices designed to execute applications and store confidential data. Therefore, they become the target of many hardware and software attacks that aim to bypass their embedded security mechanisms in order to gain access to the sensitive stored data. Recently, a new kind o...

Full description

Saved in:
Bibliographic Details
Published inJournal of Computer Virology and Hacking Techniques Vol. 16; no. 2; pp. 103 - 124
Main Authors Hamadouche, Samiya, Lanet, Jean-Louis, Mezghiche, Mohamed
Format Journal Article
LanguageEnglish
Published Paris Springer Paris 01.06.2020
Springer Nature B.V
Springer
Subjects
Online AccessGet full text
ISSN2263-8733
2263-8733
DOI10.1007/s11416-019-00340-z

Cover

Abstract Smart cards are very secure devices designed to execute applications and store confidential data. Therefore, they become the target of many hardware and software attacks that aim to bypass their embedded security mechanisms in order to gain access to the sensitive stored data. Recently, a new kind of attacks called combined attacks has appeared. They aim to induce perturbations in the application’s execution environment. Thus, correct and legitimate application can be dynamically modified to become a hostile one after being loaded in the card using a fault injection. In this paper, we treat the problem from another angle: how to design an innocent looking code in such a way that it becomes intentionally hostile after being activated by a fault injection? We present an original approach of backward code construction based on constraints satisfaction and a tree traversal algorithm. After that, we propose a way to optimize the search process by introducing heuristics for a faster convergence towards more realistic solutions. This approach is implemented in a Trace Generator tool. Thereafter, we evaluate its capacity to generate the required solutions while giving a proof-of-concept of the code desynchronization technique.
AbstractList Smart cards are very secure devices designed to execute applications and store confidential data. Therefore, they become the target of many hardware and software attacks that aim to bypass their embedded security mechanisms in order to gain access to the sensitive stored data. Recently, a new kind of attacks called combined attacks has appeared. They aim to induce perturbations in the application’s execution environment. Thus, correct and legitimate application can be dynamically modified to become a hostile one after being loaded in the card using a fault injection. In this paper, we treat the problem from another angle: how to design an innocent looking code in such a way that it becomes intentionally hostile after being activated by a fault injection? We present an original approach of backward code construction based on constraints satisfaction and a tree traversal algorithm. After that, we propose a way to optimize the search process by introducing heuristics for a faster convergence towards more realistic solutions. This approach is implemented in a Trace Generator tool. Thereafter, we evaluate its capacity to generate the required solutions while giving a proof-of-concept of the code desynchronization technique.
Smart cards are very secure devices designed to execute applications and store confidential data. Therefore, they become the target of many hardware and software attacks that aim to bypass their embedded security mechanisms in order to gain access to the sensitive stored data. Recently, a new kind of attacks called combined attacks has appeared. They aim to induce perturbations in the application’s execution environment. Thus, correct and legitimate application can be dynamically modified to become a hostile one after being loaded in the card using a fault injection. In this paper, we treat the problem from another angle: how to design an innocent looking code in such a way that it becomes intentionally hostile after being activated by a fault injection? We present an original approach of backward code construction based on constraints satisfaction and a tree traversal algorithm. After that, we propose a way to optimize the search process by introducing heuristics for a faster convergence towards more realistic solutions. This approach is implemented in a Trace Generator tool. Thereafter, we evaluate its capacity to generate the required solutions while giving a proof-of-concept of the code desynchronization technique.
Author Mezghiche, Mohamed
Hamadouche, Samiya
Lanet, Jean-Louis
Author_xml – sequence: 1
  givenname: Samiya
  surname: Hamadouche
  fullname: Hamadouche, Samiya
  email: hamadouche.samiya@univ-boumerdes.dz
  organization: LIMOSE Laboratory, Faculty of science, University M’Hamed Bougara of Boumerdes
– sequence: 2
  givenname: Jean-Louis
  surname: Lanet
  fullname: Lanet, Jean-Louis
  organization: INRIA, LHS-PEC
– sequence: 3
  givenname: Mohamed
  surname: Mezghiche
  fullname: Mezghiche, Mohamed
  organization: LIMOSE Laboratory, Faculty of science, University M’Hamed Bougara of Boumerdes
BackLink https://inria.hal.science/hal-02416015$$DView record in HAL
BookMark eNqNj0FLwzAUx4NMcM59AU8FTx6qL0mTpscx1AkDL3oOaZNuHTWZSTvZPr2ZFeZJvLz3ePz-j_e7RCPrrEHoGsMdBsjvA8YZ5ingIgWgGaSHMzQmhNNU5JSOfs0XaBrCBgAwYSLnbIz4otGNXSUqqVXfdomxqmyNTnaN70PSrb3rV-ukctrEYkPn-6prnL1C57Vqg5n-9Al6e3x4nS_S5cvT83y2TCuaiS4tM1yAFqwUZcaqglRU5BlmypTAVaVLTlhe5LwWxlBVYGOiiGaUcV0SoVVOJ4gOd3u7VftP1bZy65t35fcSgzzay8FeRnv5bS8PMXU7pNbqxDvVyMVsKY87IDECmO1wZG8GduvdR29CJzeu9zZKSZIBYcCKoogUGajKuxC8qf_3xs_zIcJ2Zfzp9B-pL2qQiCk
Cites_doi 10.1007/s11416-008-0084-2
10.1016/j.cose.2015.01.004
10.1017/S0269888910000202
10.1109/T-C.1972.223542
10.1109/PGEC.1967.264644
10.1007/s11416-010-0148-y
10.1023/A:1011039901653
10.1109/23.211348
10.1109/JPROC.2005.862424
10.1007/s41635-018-0038-1
10.1007/978-3-319-44318-8_2
10.1145/1352322.1352245
10.1109/TVLSI.2012.2231707
10.1109/TC.1978.1675175
10.1007/s13389-016-0136-3
10.1145/1053283.1053286
10.1016/j.infsof.2018.07.007
10.1016/S0377-2217(98)00364-6
10.1109/FDTC.2009.30
10.1007/978-3-319-14123-7_15
10.1109/ICEE-B.2017.8192164
10.1007/1-4020-8147-2_11
10.1007/3-540-36400-5_2
10.1145/3230833.3230842
10.1145/800153.804936
10.1109/ISSRE.2010.26
10.1007/978-3-642-12510-2_10
10.5120/15544-4098
10.1109/FDTC.2013.9
10.1145/948109.948146
10.1109/HST.2017.7951802
10.1109/FDTC.2008.18
10.1007/978-3-642-37288-9_3
10.1007/978-3-642-27257-8_19
10.1145/1030083.1030097
10.1109/FDTC.2016.18
10.1109/HST.2015.7140238
10.1007/978-3-642-27257-8_18
10.1007/978-3-642-12510-2_11
10.1007/978-3-642-27257-8_1
10.1145/948109.948151
10.1109/FDTC.2014.11
10.1109/BWCCA.2010.85
ContentType Journal Article
Copyright Springer-Verlag France SAS, part of Springer Nature 2019
Springer-Verlag France SAS, part of Springer Nature 2019.
Distributed under a Creative Commons Attribution 4.0 International License
Copyright_xml – notice: Springer-Verlag France SAS, part of Springer Nature 2019
– notice: Springer-Verlag France SAS, part of Springer Nature 2019.
– notice: Distributed under a Creative Commons Attribution 4.0 International License
DBID AAYXX
CITATION
JQ2
1XC
VOOES
ADTOC
UNPAY
DOI 10.1007/s11416-019-00340-z
DatabaseName CrossRef
ProQuest Computer Science Collection
Hyper Article en Ligne (HAL)
Hyper Article en Ligne (HAL) (Open Access)
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
ProQuest Computer Science Collection
DatabaseTitleList
ProQuest Computer Science Collection
Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2263-8733
EndPage 124
ExternalDocumentID oai:HAL:hal-02416015v1
10_1007_s11416_019_00340_z
GroupedDBID -EM
.VR
203
2J2
2JN
2JY
2KG
2KM
2LR
4.4
406
40E
95-
96X
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARTL
AASML
AATNV
AATVU
AAUYE
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABWNU
ABXPI
ACAOD
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACPIV
ACSNA
ACZOJ
ADINQ
ADKNI
ADKPE
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFQWF
AFZKB
AGAYW
AGDGC
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHBYD
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AOCGG
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BDATZ
BGNMA
BSONS
CSCUP
DDRTE
DNIVK
DPUIP
EBLON
EBS
EIOEI
EJD
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
HVGLF
IKXTQ
IWAJR
IXD
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KOV
LLZTM
M4Y
MA-
N2Q
NPVJJ
NQJWS
NU0
O93
O9J
PT4
R89
ROL
RSV
S16
SAP
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
TSG
UG4
UOJIU
UTJUX
UZXMN
VFIZW
W23
W48
YLTOR
Z7R
Z7X
Z81
Z83
Z88
ZMTXR
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ABULA
ACSTC
ADHKG
AEZWR
AFDZB
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
.86
1N0
29J
2~H
408
409
5GY
67Z
6NX
875
95~
ACOMO
AFWTZ
AGJBK
BA0
CS3
DL5
GQ8
GXS
HG5
HZ~
IHE
IJ-
IXC
IZQ
JQ2
KDC
LAK
O9-
OAM
P9O
QOS
R9I
RPX
S27
S3B
SCO
SDH
T13
TSV
U2A
VC2
WK8
Z45
1XC
ABJCF
BGLVJ
CCPQU
K7-
M7S
PHGZM
PHGZT
PTHSS
VOOES
ADTOC
UNPAY
ID FETCH-LOGICAL-c348t-b4190d85b8b45c92c387415aeb06acdb6257976f8ee3a91ee141d5356db28da73
IEDL.DBID UNPAY
ISSN 2263-8733
IngestDate Sun Oct 26 04:11:43 EDT 2025
Tue Oct 14 20:02:32 EDT 2025
Thu Sep 18 00:03:34 EDT 2025
Wed Oct 01 03:01:05 EDT 2025
Fri Feb 21 02:34:00 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2
Keywords Constraint satisfaction problem
Java Card bytecode
Backward code construction
Fault injection
Code desynchronization
Tree traversal
Language English
License Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0
other-oa
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c348t-b4190d85b8b45c92c387415aeb06acdb6257976f8ee3a91ee141d5356db28da73
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
OpenAccessLink https://proxy.k.utb.cz/login?url=https://inria.hal.science/hal-02416015
PQID 2402505999
PQPubID 2044300
PageCount 22
ParticipantIDs unpaywall_primary_10_1007_s11416_019_00340_z
hal_primary_oai_HAL_hal_02416015v1
proquest_journals_2402505999
crossref_primary_10_1007_s11416_019_00340_z
springer_journals_10_1007_s11416_019_00340_z
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2020-06-01
PublicationDateYYYYMMDD 2020-06-01
PublicationDate_xml – month: 06
  year: 2020
  text: 2020-06-01
  day: 01
PublicationDecade 2020
PublicationPlace Paris
PublicationPlace_xml – name: Paris
– name: Heidelberg
PublicationTitle Journal of Computer Virology and Hacking Techniques
PublicationTitleAbbrev J Comput Virol Hack Tech
PublicationYear 2020
Publisher Springer Paris
Springer Nature B.V
Springer
Publisher_xml – name: Springer Paris
– name: Springer Nature B.V
– name: Springer
References Piscitelli, Bhasin, Regazzoni, Sklavos, Chaves, Di Natale, Regazzoni (CR50) 2017
CR39
CR37
CR36
CR35
Lin, Stamp (CR40) 2011; 7
CR33
Barták, Salido, Rossi (CR11) 2010; 25
CR30
Karaklajić, Schmidt, Verbauwhede (CR34) 2013; 21
Borello, Mé (CR13) 2008; 4
Tsang (CR60) 1995
Singla, Gandotra, Bansal, Sofat (CR57) 2015; 122
CR3
CR6
CR5
Habing (CR28) 1992; 39
CR7
Bartak (CR10) 2005
Sere, Iguchi-Cartigny, Lanet (CR54) 2011; 5
CR9
Brailsford, Potts, Smith (CR17) 1999; 119
CR49
CR48
CR46
CR44
Armstrong (CR1) 1972; 100
CR41
Gandotra, Bansal, Sofat (CR25) 2014; 5
Miguel, Shen (CR45) 2001; 15
Barrantes, Ackley, Forrest, Stefanović (CR8) 2005; 8
Hosseinzadeh, Rauti, Laurén, Mäkelä, Holvitie, Hyrynsalmi, Leppänen (CR32) 2018; 104
CR19
CR18
Bar-El, Choukri, Naccache, Tunstall, Whelan (CR4) 2006; 94
Singh, Singh (CR56) 2018; 7
CR16
CR59
CR14
CR58
CR12
Kumar (CR38) 1992; 13
CR55
Yuce, Schaumont, Witteman (CR67) 2018; 2
CR53
CR52
Hardie, Suhocki (CR31) 1967; 4
Bailey, Coleman, Davidson (CR2) 2008; 40
Mesbah, Lanet, Mezghiche (CR43) 2018; 18
CR27
CR26
CR24
CR23
Nashimoto, Homma, Hayashi, Takahashi, Fuji, Aoki (CR47) 2017; 7
Rad, Masrom, Ibrahim (CR51) 2012; 12
CR22
CR66
CR21
CR65
CR20
CR64
CR63
CR62
CR61
Hamadouche, Lanet (CR29) 2013; 18
Menon, Chappell (CR42) 1978; 8
Bouffard, Lanet (CR15) 2015; 50
340_CR36
340_CR37
340_CR35
DB Armstrong (340_CR1) 1972; 100
340_CR39
J Singh (340_CR56) 2018; 7
B Yuce (340_CR67) 2018; 2
E Gandotra (340_CR25) 2014; 5
MW Bailey (340_CR2) 2008; 40
H Bar-El (340_CR4) 2006; 94
340_CR44
D Karaklajić (340_CR34) 2013; 21
340_CR41
R Barták (340_CR11) 2010; 25
340_CR26
340_CR23
S Hamadouche (340_CR29) 2013; 18
340_CR24
S Singla (340_CR57) 2015; 122
340_CR27
SC Brailsford (340_CR17) 1999; 119
R Piscitelli (340_CR50) 2017
V Kumar (340_CR38) 1992; 13
FH Hardie (340_CR31) 1967; 4
340_CR9
E Tsang (340_CR60) 1995
340_CR7
S Nashimoto (340_CR47) 2017; 7
BB Rad (340_CR51) 2012; 12
S Hosseinzadeh (340_CR32) 2018; 104
340_CR5
340_CR6
340_CR33
340_CR3
340_CR30
R Bartak (340_CR10) 2005
EG Barrantes (340_CR8) 2005; 8
340_CR14
340_CR58
340_CR59
340_CR12
340_CR18
340_CR19
340_CR16
J-M Borello (340_CR13) 2008; 4
340_CR61
340_CR62
340_CR21
340_CR65
340_CR22
340_CR66
PR Menon (340_CR42) 1978; 8
I Miguel (340_CR45) 2001; 15
340_CR63
340_CR20
340_CR64
340_CR48
340_CR46
A Mesbah (340_CR43) 2018; 18
340_CR49
D Lin (340_CR40) 2011; 7
G Bouffard (340_CR15) 2015; 50
DH Habing (340_CR28) 1992; 39
AAK Sere (340_CR54) 2011; 5
340_CR55
340_CR52
340_CR53
References_xml – ident: CR22
– volume: 5
  start-page: 49
  issue: 2
  year: 2011
  end-page: 60
  ident: CR54
  article-title: Evaluation of countermeasures against fault
  publication-title: Int. J. Secur. Appl.
– ident: CR49
– volume: 4
  start-page: 211
  issue: 3
  year: 2008
  end-page: 220
  ident: CR13
  article-title: Code obfuscation techniques for metamorphic viruses
  publication-title: J. Comput. Virol.
  doi: 10.1007/s11416-008-0084-2
– volume: 50
  start-page: 33
  year: 2015
  end-page: 46
  ident: CR15
  article-title: The ultimate control flow transfer in a Java based smart card
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2015.01.004
– ident: CR39
– ident: CR16
– ident: CR12
– ident: CR35
– volume: 25
  start-page: 249
  issue: 3
  year: 2010
  end-page: 279
  ident: CR11
  article-title: New trends in constraint satisfaction, planning, and scheduling: a survey
  publication-title: Knowl. Eng. Rev.
  doi: 10.1017/S0269888910000202
– ident: CR61
– ident: CR58
– volume: 100
  start-page: 464
  issue: 5
  year: 1972
  end-page: 471
  ident: CR1
  article-title: A deductive method for simulating faults in logic circuits
  publication-title: IEEE Trans. Comput.
  doi: 10.1109/T-C.1972.223542
– volume: 4
  start-page: 412
  year: 1967
  end-page: 429
  ident: CR31
  article-title: Design and use of fault simulation for saturn computer design
  publication-title: IEEE Trans. Electron. Comput.
  doi: 10.1109/PGEC.1967.264644
– volume: 12
  start-page: 74
  issue: 8
  year: 2012
  end-page: 83
  ident: CR51
  article-title: Camouflage in malware: from encryption to metamorphism
  publication-title: Int. J. Comput. Sci. Netw. Secur.
– ident: CR21
– ident: CR46
– ident: CR19
– volume: 7
  start-page: 201
  issue: 3
  year: 2011
  end-page: 214
  ident: CR40
  article-title: Hunting for undetectable metamorphic viruses
  publication-title: J. Comput. Virol.
  doi: 10.1007/s11416-010-0148-y
– volume: 15
  start-page: 243
  issue: 4
  year: 2001
  end-page: 267
  ident: CR45
  article-title: Solution techniques for constraint satisfaction problems: foundations
  publication-title: Artif. Intell. Rev.
  doi: 10.1023/A:1011039901653
– volume: 39
  start-page: 1647
  year: 1992
  end-page: 1653
  ident: CR28
  article-title: The use of lasers to simulate radiation-induced transients in semiconductor devices and circuits
  publication-title: IEEE Trans. Nuclear Sci.
  doi: 10.1109/23.211348
– ident: CR9
– volume: 18
  start-page: 1
  issue: 1
  year: 2018
  end-page: 16
  ident: CR43
  article-title: Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM
  publication-title: Int. J. Inf. Secur.
– ident: CR36
– volume: 94
  start-page: 370
  issue: 2
  year: 2006
  end-page: 382
  ident: CR4
  article-title: The sorcerer’s apprentice guide to fault attacks
  publication-title: Proc. IEEE
  doi: 10.1109/JPROC.2005.862424
– ident: CR5
– volume: 7
  start-page: 100
  issue: 3
  year: 2018
  end-page: 110
  ident: CR56
  article-title: Challenge of malware analysis: malware obfuscation techniques
  publication-title: Int. J. Inf. Secur. Sci.
– ident: CR64
– ident: CR26
– year: 2005
  ident: CR10
  publication-title: Constraint Propagation and Backtracking-Based Search
– ident: CR18
– ident: CR66
– year: 1995
  ident: CR60
  publication-title: Foundations of Constraint Satisfaction
– ident: CR14
– ident: CR37
– ident: CR53
– volume: 2
  start-page: 1
  issue: 2
  year: 2018
  end-page: 20
  ident: CR67
  article-title: Fault attacks on secure embedded software: threats, design, and evaluation
  publication-title: J. Hardw. Syst. Secur.
  doi: 10.1007/s41635-018-0038-1
– volume: 5
  start-page: 56
  issue: 02
  year: 2014
  ident: CR25
  article-title: Malware analysis and classification: a survey
  publication-title: J. Inf. Secur.
– ident: CR30
– ident: CR33
– ident: CR6
– start-page: 27
  year: 2017
  end-page: 47
  ident: CR50
  article-title: Fault attacks, injection techniques and tools for simulation
  publication-title: Hardware Security and Trust
  doi: 10.1007/978-3-319-44318-8_2
– volume: 122
  start-page: 28
  issue: 10
  year: 2015
  end-page: 33
  ident: CR57
  article-title: Detecting and classifying morphed malwares: a survey
  publication-title: Int. J. Comput. Appl.
– ident: CR63
– volume: 40
  start-page: 315
  issue: 1
  year: 2008
  end-page: 319
  ident: CR2
  article-title: Defense against the dark arts
  publication-title: ACM SIGCSE Bull.
  doi: 10.1145/1352322.1352245
– ident: CR27
– ident: CR23
– volume: 13
  start-page: 32
  issue: 1
  year: 1992
  ident: CR38
  article-title: Algorithms for constraint-satisfaction problems: a survey
  publication-title: AI Mag.
– ident: CR44
– ident: CR48
– volume: 21
  start-page: 2295
  issue: 12
  year: 2013
  end-page: 2306
  ident: CR34
  article-title: Hardware designer’s guide to fault attacks
  publication-title: IEEE Trans. Very Large Scale Integr. (VLSI) Syst.
  doi: 10.1109/TVLSI.2012.2231707
– ident: CR65
– ident: CR3
– volume: 8
  start-page: 689
  year: 1978
  end-page: 695
  ident: CR42
  article-title: Deductive fault simulation with functional blocks
  publication-title: IEEE Trans. Comput.
  doi: 10.1109/TC.1978.1675175
– ident: CR52
– volume: 7
  start-page: 35
  issue: 1
  year: 2017
  end-page: 46
  ident: CR47
  article-title: Buffer overflow attack with multiple fault injection and a proven countermeasure
  publication-title: J. Cryptogr. Eng.
  doi: 10.1007/s13389-016-0136-3
– volume: 8
  start-page: 3
  issue: 1
  year: 2005
  end-page: 40
  ident: CR8
  article-title: Randomized instruction set emulation
  publication-title: ACM Trans. Inf. Syst. Secur. (TISSEC)
  doi: 10.1145/1053283.1053286
– ident: CR55
– ident: CR7
– volume: 104
  start-page: 72
  year: 2018
  end-page: 93
  ident: CR32
  article-title: Diversification and obfuscation techniques for software security: a systematic literature review
  publication-title: Inf. Softw. Technol.
  doi: 10.1016/j.infsof.2018.07.007
– ident: CR59
– volume: 18
  start-page: 130
  issue: 2–3
  year: 2013
  end-page: 137
  ident: CR29
  article-title: Virus in a smart card: Myth or reality?
  publication-title: J. Inf. Secur. Appl.
– ident: CR41
– ident: CR62
– ident: CR24
– volume: 119
  start-page: 557
  issue: 3
  year: 1999
  end-page: 581
  ident: CR17
  article-title: Constraint satisfaction problems: algorithms and applications
  publication-title: Eur. J. Oper. Res.
  doi: 10.1016/S0377-2217(98)00364-6
– ident: CR20
– ident: 340_CR21
– volume: 122
  start-page: 28
  issue: 10
  year: 2015
  ident: 340_CR57
  publication-title: Int. J. Comput. Appl.
– ident: 340_CR7
  doi: 10.1109/FDTC.2009.30
– ident: 340_CR33
  doi: 10.1007/978-3-319-14123-7_15
– ident: 340_CR19
– ident: 340_CR48
– volume: 13
  start-page: 32
  issue: 1
  year: 1992
  ident: 340_CR38
  publication-title: AI Mag.
– volume: 25
  start-page: 249
  issue: 3
  year: 2010
  ident: 340_CR11
  publication-title: Knowl. Eng. Rev.
  doi: 10.1017/S0269888910000202
– ident: 340_CR44
  doi: 10.1109/ICEE-B.2017.8192164
– ident: 340_CR26
  doi: 10.1007/1-4020-8147-2_11
– volume: 39
  start-page: 1647
  year: 1992
  ident: 340_CR28
  publication-title: IEEE Trans. Nuclear Sci.
  doi: 10.1109/23.211348
– volume: 18
  start-page: 1
  issue: 1
  year: 2018
  ident: 340_CR43
  publication-title: Int. J. Inf. Secur.
– volume: 7
  start-page: 35
  issue: 1
  year: 2017
  ident: 340_CR47
  publication-title: J. Cryptogr. Eng.
  doi: 10.1007/s13389-016-0136-3
– volume-title: Constraint Propagation and Backtracking-Based Search
  year: 2005
  ident: 340_CR10
– volume: 104
  start-page: 72
  year: 2018
  ident: 340_CR32
  publication-title: Inf. Softw. Technol.
  doi: 10.1016/j.infsof.2018.07.007
– start-page: 27
  volume-title: Hardware Security and Trust
  year: 2017
  ident: 340_CR50
  doi: 10.1007/978-3-319-44318-8_2
– volume: 8
  start-page: 689
  year: 1978
  ident: 340_CR42
  publication-title: IEEE Trans. Comput.
  doi: 10.1109/TC.1978.1675175
– ident: 340_CR58
  doi: 10.1007/3-540-36400-5_2
– ident: 340_CR18
  doi: 10.1145/3230833.3230842
– ident: 340_CR61
  doi: 10.1145/800153.804936
– ident: 340_CR3
– volume: 4
  start-page: 211
  issue: 3
  year: 2008
  ident: 340_CR13
  publication-title: J. Comput. Virol.
  doi: 10.1007/s11416-008-0084-2
– ident: 340_CR20
  doi: 10.1109/ISSRE.2010.26
– ident: 340_CR53
– volume: 100
  start-page: 464
  issue: 5
  year: 1972
  ident: 340_CR1
  publication-title: IEEE Trans. Comput.
  doi: 10.1109/T-C.1972.223542
– volume: 2
  start-page: 1
  issue: 2
  year: 2018
  ident: 340_CR67
  publication-title: J. Hardw. Syst. Secur.
  doi: 10.1007/s41635-018-0038-1
– volume: 7
  start-page: 201
  issue: 3
  year: 2011
  ident: 340_CR40
  publication-title: J. Comput. Virol.
  doi: 10.1007/s11416-010-0148-y
– ident: 340_CR62
  doi: 10.1007/978-3-642-12510-2_10
– volume: 94
  start-page: 370
  issue: 2
  year: 2006
  ident: 340_CR4
  publication-title: Proc. IEEE
  doi: 10.1109/JPROC.2005.862424
– ident: 340_CR55
  doi: 10.5120/15544-4098
– ident: 340_CR46
  doi: 10.1109/FDTC.2013.9
– ident: 340_CR64
– ident: 340_CR35
  doi: 10.1145/948109.948146
– ident: 340_CR22
– ident: 340_CR36
  doi: 10.1109/HST.2017.7951802
– ident: 340_CR27
  doi: 10.1109/FDTC.2008.18
– volume: 5
  start-page: 56
  issue: 02
  year: 2014
  ident: 340_CR25
  publication-title: J. Inf. Secur.
– ident: 340_CR39
  doi: 10.1007/978-3-642-37288-9_3
– ident: 340_CR65
– volume: 40
  start-page: 315
  issue: 1
  year: 2008
  ident: 340_CR2
  publication-title: ACM SIGCSE Bull.
  doi: 10.1145/1352322.1352245
– ident: 340_CR5
  doi: 10.1007/978-3-642-27257-8_19
– volume: 18
  start-page: 130
  issue: 2–3
  year: 2013
  ident: 340_CR29
  publication-title: J. Inf. Secur. Appl.
– volume-title: Foundations of Constraint Satisfaction
  year: 1995
  ident: 340_CR60
– ident: 340_CR63
  doi: 10.1145/1030083.1030097
– volume: 50
  start-page: 33
  year: 2015
  ident: 340_CR15
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2015.01.004
– ident: 340_CR59
  doi: 10.1109/FDTC.2016.18
– ident: 340_CR9
– ident: 340_CR52
  doi: 10.1109/HST.2015.7140238
– ident: 340_CR23
– volume: 4
  start-page: 412
  year: 1967
  ident: 340_CR31
  publication-title: IEEE Trans. Electron. Comput.
  doi: 10.1109/PGEC.1967.264644
– ident: 340_CR14
  doi: 10.1007/978-3-642-27257-8_18
– volume: 119
  start-page: 557
  issue: 3
  year: 1999
  ident: 340_CR17
  publication-title: Eur. J. Oper. Res.
  doi: 10.1016/S0377-2217(98)00364-6
– volume: 21
  start-page: 2295
  issue: 12
  year: 2013
  ident: 340_CR34
  publication-title: IEEE Trans. Very Large Scale Integr. (VLSI) Syst.
  doi: 10.1109/TVLSI.2012.2231707
– volume: 5
  start-page: 49
  issue: 2
  year: 2011
  ident: 340_CR54
  publication-title: Int. J. Secur. Appl.
– ident: 340_CR6
  doi: 10.1007/978-3-642-12510-2_11
– ident: 340_CR49
– volume: 12
  start-page: 74
  issue: 8
  year: 2012
  ident: 340_CR51
  publication-title: Int. J. Comput. Sci. Netw. Secur.
– ident: 340_CR16
  doi: 10.1007/978-3-642-27257-8_1
– ident: 340_CR30
– ident: 340_CR12
  doi: 10.1145/948109.948151
– ident: 340_CR37
  doi: 10.1109/FDTC.2014.11
– volume: 15
  start-page: 243
  issue: 4
  year: 2001
  ident: 340_CR45
  publication-title: Artif. Intell. Rev.
  doi: 10.1023/A:1011039901653
– volume: 7
  start-page: 100
  issue: 3
  year: 2018
  ident: 340_CR56
  publication-title: Int. J. Inf. Secur. Sci.
– ident: 340_CR66
  doi: 10.1109/BWCCA.2010.85
– ident: 340_CR24
– ident: 340_CR41
– volume: 8
  start-page: 3
  issue: 1
  year: 2005
  ident: 340_CR8
  publication-title: ACM Trans. Inf. Syst. Secur. (TISSEC)
  doi: 10.1145/1053283.1053286
SSID ssj0001258765
ssj0054875
Score 2.1378694
Snippet Smart cards are very secure devices designed to execute applications and store confidential data. Therefore, they become the target of many hardware and...
SourceID unpaywall
hal
proquest
crossref
springer
SourceType Open Access Repository
Aggregation Database
Index Database
Publisher
StartPage 103
SubjectTerms Algorithms
Computer Science
Cryptography and Security
Embedded Systems
Original Paper
Search process
Smart cards
Viruses
SummonAdditionalLinks – databaseName: SpringerLINK - Czech Republic Consortium
  dbid: AGYKE
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLZgOwAHxlMUBooQN9ZpfaRtjhNiVLxOTBqnKmlTMTGVibVD7NfjdO06EELs0kOfqZ3En-P4M8AFC9HqchHppjBUCTPH0llsRToT3OzEir4lj-A_PDp-374d0EGRFDYpd7uXIcl8pq6S3QwED-j6Ml2RqnT02TrUc76tGtS7N893y2srFAc5LXJkfn_4mx1af1G7IJcg5iIqugUbWTLmnx98NFoyPL0G9Msmz_ebvLazVLTD2Q82x1X_aQe2CyRKuvOuswtrMtmDRlnlgRSDfh8cf6jsG-Ek5tkoJTLPtorIdPieTUhR54eo1Hg8VHy0B9DvXT9d-XpRbUEPLdtLdWEjNog8Kjxh05CZoeUptMGl6Dg8jAQ6Si5il9iT0uLMkBKbHlGLqoJUXsRd6xBqyVsij4DEjBvSdmPsBtSOHYcbkZqZGcXZhLu2rcFlKftgPCfVCCr6ZCWSAEUS5CIJZhqco3oWNyo-bL97H6hzCDAM9Cjp1NCgWWovKEbhJFCRI6oIaJgGrVIB1eW_PtlaaP0fLTxe7e0nsGkqrz1fy2lCDRUjTxHapOKs6Mlf9Bvsrg
  priority: 102
  providerName: Springer Nature
Title Hiding a fault enabled virus through code construction
URI https://link.springer.com/article/10.1007/s11416-019-00340-z
https://www.proquest.com/docview/2402505999
https://inria.hal.science/hal-02416015
UnpaywallVersion submittedVersion
Volume 16
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVLSH
  databaseName: SpringerLink Journals
  customDbUrl:
  mediaType: online
  eissn: 2263-8733
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001258765
  issn: 2263-8733
  databaseCode: AFBBN
  dateStart: 20051101
  isFulltext: true
  providerName: Library Specific Holdings
– providerCode: PRVAVX
  databaseName: SpringerLINK - Czech Republic Consortium
  customDbUrl:
  eissn: 2263-8733
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001258765
  issn: 2263-8733
  databaseCode: AGYKE
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: http://link.springer.com
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLink Journals (ICM)
  customDbUrl:
  eissn: 2263-8733
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0054875
  issn: 2263-8733
  databaseCode: U2A
  dateStart: 20051128
  isFulltext: true
  titleUrlDefault: http://www.springerlink.com/journals/
  providerName: Springer Nature
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLbYdgAOvBHjMUWIG2SsTdM2xwoBEy9xYBKcqqRNNcRUEHsg9utxunQDDjwuVdVGbeovie06_gxwIBLUulKl1FWOKWHmMyoyllKhpNvKDH1LEcG_vvHbHe_int_bDbJFLkyOcm920e60GuAYzykqEgc9B16Bms_R5q5CrXNzGz2YynEuPj4MGLMZMZO8OAfbo5csqOFfadHxF61T6Zo9j58MymkMdBHmh_mLfH-Tvd4nNXO2DOdlBye7S56aw4FqJuNv3I2_f8EKLFlLk0STobEKczpfg-WyigOxk3od_Paj0V9EkkwOewOii2yqlIweX4d9Yuv4EJP6jocZ3-wGdM5O707a1FZToAnzwgFVHur-NOQqVB5PhJuw0FgTUquWL5NUoSMUoG2ShVozKRytUYYpZ9wUnApTGbBNqObPud4CkgnpaC_IEGbuZb4vndSsvILjaiEDz6vDYSnt-GVCmhHP6JENNjFiExfYxOM67KOEpg0N33U7uorNtVJqI6cOuyVesZ1l_dhEhrghmBF1OCoxnN3-6ZVHU5z_0MPt_zXfgQXXeOXFv5pdqCIweg9Nl4FqQC06f7g8bUCl40YNO4o_AKp_6DY
linkProvider Unpaywall
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLZgOwwOjKcYzwhxg6K1TbrmOCGgwLbTJo1TlLSpQEwFsQ7Efj1O124DIcQuPfSZ2kn8OY4_A5zyEK2uVJHlKNuUMPNci8duZHElnXps6FuyCH674wU9etdn_TwpbFjsdi9CktlMPUt2sxE8oOvLLUOqUrfGy1Cm6KA4JSg3bx7u59dWGA5ylufI_P7wNzu0_Gh2Qc5BzGlUdBUqo-RVfn7IwWDO8FxXoVc0ebLf5PlilKqLcPyDzXHRf1qHtRyJkuak62zAkk42oVpUeSD5oN8CL3gy9o1IEsvRICU6y7aKyPvT22hI8jo_xKTG42HGR7sNveur7mVg5dUWrNClfmopitgg8pnyFWUhd0LXN2hDalX3ZBgpdJQaiF1iX2tXcltrbHrEXGYKUvmRbLg7UEpeEr0LJObS1rQRYzdgNPY8aUdmZuYMZxPZoLQGZ4XsxeuEVEPM6JONSASKRGQiEeManKB6pjcaPuyg2RLmHAIMGz1K9m7X4KDQnshH4VCYyBEzBDS8BueFAmaX__rk-VTr_2jh3mJvP4ZK0G23ROu2c78PK47x4LN1nQMooZL0IcKcVB3lvfoLDSnvjQ
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT8MwDLaASTwOjKcYDIgQN-hY16ZtjhMwxmviwCQ4RUmTCsRUJuiG2K_H6dptIIRAXHroM42d-HMcfwbYZyFaXSGVVZO2KWHmORaLHGUxKWrVyNC3pBH865bXbLsXd_RuIos_3e2ehySHOQ2GpSlOjroqOhonvtkIJNANZpYhWKlag2kooGvio6YX6mf3l5PrLBQHPM3yZb5_-JNNmn4wOyIn4OYoQroAc724K97fRKczYYQaRRB584d7T54qvURWwsEXZsf__N8SLGYIldSHKrUMUzpegWJe_YFkk8EqeM1HY_eIIJHodRKi0ywsRfqPL71XktX_ISZlHg9jnto1aDdOb4-bVlaFwQodN0gs6SJmUAGVgXRpyGqhExgUIrSseiJUEh0oHzFNFGjtCGZrjU1X1KGmUFWghO-sw0z8HOsNIBETtnb9CNWDupHnCVuZGZtRnGWE77olOMjlwLtDsg0-plU2XcKxS3jaJXxQgj0U1ehGw5PdrF9xcw6Bh42eJu3bJSjnkuTZ6HzlJqJEDTENK8FhLozx5Z8-eTjSgF-0cPNvb9-F2ZuTBr86b11uwXzNOPbpck8ZZlBGehvRTyJ3MgX_ACjp-HE
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLZgOwAH3ojxUoS4sYy1adrmOCFgQoA4MGmcqqRNtYmpTOyB2K_H6dJtcOBxqao2alN_SWzX8WeAMxGj1pUqoa5yTAkzn1GRsoQKJd16auhb8gj-_YPfbHm3bd62G2TzXJgM5V7roN1pNcAFnlNUJA56DnwZyj5Hm7sE5dbDY-PZVI5z8fFhwJjNiJnmxTnYHr1kQQ3_Sp1Ovmid5Y7Z87hgUM5ioGuwMsr68uNd9noLauZ6A26KDk53l7zURkNViyffuBt__4JNWLeWJmlMh8YWLOlsGzaKKg7ETuod8Jtdo7-IJKkc9YZE59lUCRl330YDYuv4EJP6joc53-wutK6vni6b1FZToDHzwiFVHur-JOQqVB6PhRuz0FgTUqu6L-NEoSMUoG2ShlozKRytUYYJZ9wUnAoTGbA9KGWvmd4HkgrpaC9IEWbupb4vncSsvILjaiEDz6vAeSHtqD8lzYjm9MgGmwixiXJsokkFTlFCs4aG77rZuIvMtUJqY6cCRwVekZ1lg8hEhrghmBEVqBYYzm__9MrqDOc_9PDgf80PYdU1Xnn-r-YISgiMPkbTZahO7Lj9BAw05bk
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Hiding+a+fault+enabled+virus+through+code+construction&rft.jtitle=Journal+of+Computer+Virology+and+Hacking+Techniques&rft.au=Hamadouche+Samiya&rft.au=Jean-Louis%2C+Lanet&rft.au=Mezghiche+Mohamed&rft.date=2020-06-01&rft.pub=Springer+Nature+B.V&rft.issn=2263-8733&rft.eissn=2263-8733&rft.volume=16&rft.issue=2&rft.spage=103&rft.epage=124&rft_id=info:doi/10.1007%2Fs11416-019-00340-z&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2263-8733&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2263-8733&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2263-8733&client=summon