Hiding a fault enabled virus through code construction
Smart cards are very secure devices designed to execute applications and store confidential data. Therefore, they become the target of many hardware and software attacks that aim to bypass their embedded security mechanisms in order to gain access to the sensitive stored data. Recently, a new kind o...
Saved in:
| Published in | Journal of Computer Virology and Hacking Techniques Vol. 16; no. 2; pp. 103 - 124 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
Paris
Springer Paris
01.06.2020
Springer Nature B.V Springer |
| Subjects | |
| Online Access | Get full text |
| ISSN | 2263-8733 2263-8733 |
| DOI | 10.1007/s11416-019-00340-z |
Cover
| Abstract | Smart cards are very secure devices designed to execute applications and store confidential data. Therefore, they become the target of many hardware and software attacks that aim to bypass their embedded security mechanisms in order to gain access to the sensitive stored data. Recently, a new kind of attacks called combined attacks has appeared. They aim to induce perturbations in the application’s execution environment. Thus, correct and legitimate application can be dynamically modified to become a hostile one after being loaded in the card using a fault injection. In this paper, we treat the problem from another angle: how to design an innocent looking code in such a way that it becomes intentionally hostile after being activated by a fault injection? We present an original approach of backward code construction based on constraints satisfaction and a tree traversal algorithm. After that, we propose a way to optimize the search process by introducing heuristics for a faster convergence towards more realistic solutions. This approach is implemented in a
Trace Generator
tool. Thereafter, we evaluate its capacity to generate the required solutions while giving a proof-of-concept of the code desynchronization technique. |
|---|---|
| AbstractList | Smart cards are very secure devices designed to execute applications and store confidential data. Therefore, they become the target of many hardware and software attacks that aim to bypass their embedded security mechanisms in order to gain access to the sensitive stored data. Recently, a new kind of attacks called combined attacks has appeared. They aim to induce perturbations in the application’s execution environment. Thus, correct and legitimate application can be dynamically modified to become a hostile one after being loaded in the card using a fault injection. In this paper, we treat the problem from another angle: how to design an innocent looking code in such a way that it becomes intentionally hostile after being activated by a fault injection? We present an original approach of backward code construction based on constraints satisfaction and a tree traversal algorithm. After that, we propose a way to optimize the search process by introducing heuristics for a faster convergence towards more realistic solutions. This approach is implemented in a
Trace Generator
tool. Thereafter, we evaluate its capacity to generate the required solutions while giving a proof-of-concept of the code desynchronization technique. Smart cards are very secure devices designed to execute applications and store confidential data. Therefore, they become the target of many hardware and software attacks that aim to bypass their embedded security mechanisms in order to gain access to the sensitive stored data. Recently, a new kind of attacks called combined attacks has appeared. They aim to induce perturbations in the application’s execution environment. Thus, correct and legitimate application can be dynamically modified to become a hostile one after being loaded in the card using a fault injection. In this paper, we treat the problem from another angle: how to design an innocent looking code in such a way that it becomes intentionally hostile after being activated by a fault injection? We present an original approach of backward code construction based on constraints satisfaction and a tree traversal algorithm. After that, we propose a way to optimize the search process by introducing heuristics for a faster convergence towards more realistic solutions. This approach is implemented in a Trace Generator tool. Thereafter, we evaluate its capacity to generate the required solutions while giving a proof-of-concept of the code desynchronization technique. |
| Author | Mezghiche, Mohamed Hamadouche, Samiya Lanet, Jean-Louis |
| Author_xml | – sequence: 1 givenname: Samiya surname: Hamadouche fullname: Hamadouche, Samiya email: hamadouche.samiya@univ-boumerdes.dz organization: LIMOSE Laboratory, Faculty of science, University M’Hamed Bougara of Boumerdes – sequence: 2 givenname: Jean-Louis surname: Lanet fullname: Lanet, Jean-Louis organization: INRIA, LHS-PEC – sequence: 3 givenname: Mohamed surname: Mezghiche fullname: Mezghiche, Mohamed organization: LIMOSE Laboratory, Faculty of science, University M’Hamed Bougara of Boumerdes |
| BackLink | https://inria.hal.science/hal-02416015$$DView record in HAL |
| BookMark | eNqNj0FLwzAUx4NMcM59AU8FTx6qL0mTpscx1AkDL3oOaZNuHTWZSTvZPr2ZFeZJvLz3ePz-j_e7RCPrrEHoGsMdBsjvA8YZ5ingIgWgGaSHMzQmhNNU5JSOfs0XaBrCBgAwYSLnbIz4otGNXSUqqVXfdomxqmyNTnaN70PSrb3rV-ukctrEYkPn-6prnL1C57Vqg5n-9Al6e3x4nS_S5cvT83y2TCuaiS4tM1yAFqwUZcaqglRU5BlmypTAVaVLTlhe5LwWxlBVYGOiiGaUcV0SoVVOJ4gOd3u7VftP1bZy65t35fcSgzzay8FeRnv5bS8PMXU7pNbqxDvVyMVsKY87IDECmO1wZG8GduvdR29CJzeu9zZKSZIBYcCKoogUGajKuxC8qf_3xs_zIcJ2Zfzp9B-pL2qQiCk |
| Cites_doi | 10.1007/s11416-008-0084-2 10.1016/j.cose.2015.01.004 10.1017/S0269888910000202 10.1109/T-C.1972.223542 10.1109/PGEC.1967.264644 10.1007/s11416-010-0148-y 10.1023/A:1011039901653 10.1109/23.211348 10.1109/JPROC.2005.862424 10.1007/s41635-018-0038-1 10.1007/978-3-319-44318-8_2 10.1145/1352322.1352245 10.1109/TVLSI.2012.2231707 10.1109/TC.1978.1675175 10.1007/s13389-016-0136-3 10.1145/1053283.1053286 10.1016/j.infsof.2018.07.007 10.1016/S0377-2217(98)00364-6 10.1109/FDTC.2009.30 10.1007/978-3-319-14123-7_15 10.1109/ICEE-B.2017.8192164 10.1007/1-4020-8147-2_11 10.1007/3-540-36400-5_2 10.1145/3230833.3230842 10.1145/800153.804936 10.1109/ISSRE.2010.26 10.1007/978-3-642-12510-2_10 10.5120/15544-4098 10.1109/FDTC.2013.9 10.1145/948109.948146 10.1109/HST.2017.7951802 10.1109/FDTC.2008.18 10.1007/978-3-642-37288-9_3 10.1007/978-3-642-27257-8_19 10.1145/1030083.1030097 10.1109/FDTC.2016.18 10.1109/HST.2015.7140238 10.1007/978-3-642-27257-8_18 10.1007/978-3-642-12510-2_11 10.1007/978-3-642-27257-8_1 10.1145/948109.948151 10.1109/FDTC.2014.11 10.1109/BWCCA.2010.85 |
| ContentType | Journal Article |
| Copyright | Springer-Verlag France SAS, part of Springer Nature 2019 Springer-Verlag France SAS, part of Springer Nature 2019. Distributed under a Creative Commons Attribution 4.0 International License |
| Copyright_xml | – notice: Springer-Verlag France SAS, part of Springer Nature 2019 – notice: Springer-Verlag France SAS, part of Springer Nature 2019. – notice: Distributed under a Creative Commons Attribution 4.0 International License |
| DBID | AAYXX CITATION JQ2 1XC VOOES ADTOC UNPAY |
| DOI | 10.1007/s11416-019-00340-z |
| DatabaseName | CrossRef ProQuest Computer Science Collection Hyper Article en Ligne (HAL) Hyper Article en Ligne (HAL) (Open Access) Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef ProQuest Computer Science Collection |
| DatabaseTitleList | ProQuest Computer Science Collection |
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2263-8733 |
| EndPage | 124 |
| ExternalDocumentID | oai:HAL:hal-02416015v1 10_1007_s11416_019_00340_z |
| GroupedDBID | -EM .VR 203 2J2 2JN 2JY 2KG 2KM 2LR 4.4 406 40E 95- 96X AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARTL AASML AATNV AATVU AAUYE AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABWNU ABXPI ACAOD ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACPIV ACSNA ACZOJ ADINQ ADKNI ADKPE ADURQ ADYFF ADZKW AEBTG AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFQWF AFZKB AGAYW AGDGC AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHBYD AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AOCGG ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BDATZ BGNMA BSONS CSCUP DDRTE DNIVK DPUIP EBLON EBS EIOEI EJD FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 HVGLF IKXTQ IWAJR IXD J-C J0Z JBSCW JCJTX JZLTJ KOV LLZTM M4Y MA- N2Q NPVJJ NQJWS NU0 O93 O9J PT4 R89 ROL RSV S16 SAP SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN TSG UG4 UOJIU UTJUX UZXMN VFIZW W23 W48 YLTOR Z7R Z7X Z81 Z83 Z88 ZMTXR AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ABULA ACSTC ADHKG AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION .86 1N0 29J 2~H 408 409 5GY 67Z 6NX 875 95~ ACOMO AFWTZ AGJBK BA0 CS3 DL5 GQ8 GXS HG5 HZ~ IHE IJ- IXC IZQ JQ2 KDC LAK O9- OAM P9O QOS R9I RPX S27 S3B SCO SDH T13 TSV U2A VC2 WK8 Z45 1XC ABJCF BGLVJ CCPQU K7- M7S PHGZM PHGZT PTHSS VOOES ADTOC UNPAY |
| ID | FETCH-LOGICAL-c348t-b4190d85b8b45c92c387415aeb06acdb6257976f8ee3a91ee141d5356db28da73 |
| IEDL.DBID | UNPAY |
| ISSN | 2263-8733 |
| IngestDate | Sun Oct 26 04:11:43 EDT 2025 Tue Oct 14 20:02:32 EDT 2025 Thu Sep 18 00:03:34 EDT 2025 Wed Oct 01 03:01:05 EDT 2025 Fri Feb 21 02:34:00 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 2 |
| Keywords | Constraint satisfaction problem Java Card bytecode Backward code construction Fault injection Code desynchronization Tree traversal |
| Language | English |
| License | Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0 other-oa |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c348t-b4190d85b8b45c92c387415aeb06acdb6257976f8ee3a91ee141d5356db28da73 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://inria.hal.science/hal-02416015 |
| PQID | 2402505999 |
| PQPubID | 2044300 |
| PageCount | 22 |
| ParticipantIDs | unpaywall_primary_10_1007_s11416_019_00340_z hal_primary_oai_HAL_hal_02416015v1 proquest_journals_2402505999 crossref_primary_10_1007_s11416_019_00340_z springer_journals_10_1007_s11416_019_00340_z |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2020-06-01 |
| PublicationDateYYYYMMDD | 2020-06-01 |
| PublicationDate_xml | – month: 06 year: 2020 text: 2020-06-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Paris |
| PublicationPlace_xml | – name: Paris – name: Heidelberg |
| PublicationTitle | Journal of Computer Virology and Hacking Techniques |
| PublicationTitleAbbrev | J Comput Virol Hack Tech |
| PublicationYear | 2020 |
| Publisher | Springer Paris Springer Nature B.V Springer |
| Publisher_xml | – name: Springer Paris – name: Springer Nature B.V – name: Springer |
| References | Piscitelli, Bhasin, Regazzoni, Sklavos, Chaves, Di Natale, Regazzoni (CR50) 2017 CR39 CR37 CR36 CR35 Lin, Stamp (CR40) 2011; 7 CR33 Barták, Salido, Rossi (CR11) 2010; 25 CR30 Karaklajić, Schmidt, Verbauwhede (CR34) 2013; 21 Borello, Mé (CR13) 2008; 4 Tsang (CR60) 1995 Singla, Gandotra, Bansal, Sofat (CR57) 2015; 122 CR3 CR6 CR5 Habing (CR28) 1992; 39 CR7 Bartak (CR10) 2005 Sere, Iguchi-Cartigny, Lanet (CR54) 2011; 5 CR9 Brailsford, Potts, Smith (CR17) 1999; 119 CR49 CR48 CR46 CR44 Armstrong (CR1) 1972; 100 CR41 Gandotra, Bansal, Sofat (CR25) 2014; 5 Miguel, Shen (CR45) 2001; 15 Barrantes, Ackley, Forrest, Stefanović (CR8) 2005; 8 Hosseinzadeh, Rauti, Laurén, Mäkelä, Holvitie, Hyrynsalmi, Leppänen (CR32) 2018; 104 CR19 CR18 Bar-El, Choukri, Naccache, Tunstall, Whelan (CR4) 2006; 94 Singh, Singh (CR56) 2018; 7 CR16 CR59 CR14 CR58 CR12 Kumar (CR38) 1992; 13 CR55 Yuce, Schaumont, Witteman (CR67) 2018; 2 CR53 CR52 Hardie, Suhocki (CR31) 1967; 4 Bailey, Coleman, Davidson (CR2) 2008; 40 Mesbah, Lanet, Mezghiche (CR43) 2018; 18 CR27 CR26 CR24 CR23 Nashimoto, Homma, Hayashi, Takahashi, Fuji, Aoki (CR47) 2017; 7 Rad, Masrom, Ibrahim (CR51) 2012; 12 CR22 CR66 CR21 CR65 CR20 CR64 CR63 CR62 CR61 Hamadouche, Lanet (CR29) 2013; 18 Menon, Chappell (CR42) 1978; 8 Bouffard, Lanet (CR15) 2015; 50 340_CR36 340_CR37 340_CR35 DB Armstrong (340_CR1) 1972; 100 340_CR39 J Singh (340_CR56) 2018; 7 B Yuce (340_CR67) 2018; 2 E Gandotra (340_CR25) 2014; 5 MW Bailey (340_CR2) 2008; 40 H Bar-El (340_CR4) 2006; 94 340_CR44 D Karaklajić (340_CR34) 2013; 21 340_CR41 R Barták (340_CR11) 2010; 25 340_CR26 340_CR23 S Hamadouche (340_CR29) 2013; 18 340_CR24 S Singla (340_CR57) 2015; 122 340_CR27 SC Brailsford (340_CR17) 1999; 119 R Piscitelli (340_CR50) 2017 V Kumar (340_CR38) 1992; 13 FH Hardie (340_CR31) 1967; 4 340_CR9 E Tsang (340_CR60) 1995 340_CR7 S Nashimoto (340_CR47) 2017; 7 BB Rad (340_CR51) 2012; 12 S Hosseinzadeh (340_CR32) 2018; 104 340_CR5 340_CR6 340_CR33 340_CR3 340_CR30 R Bartak (340_CR10) 2005 EG Barrantes (340_CR8) 2005; 8 340_CR14 340_CR58 340_CR59 340_CR12 340_CR18 340_CR19 340_CR16 J-M Borello (340_CR13) 2008; 4 340_CR61 340_CR62 340_CR21 340_CR65 340_CR22 340_CR66 PR Menon (340_CR42) 1978; 8 I Miguel (340_CR45) 2001; 15 340_CR63 340_CR20 340_CR64 340_CR48 340_CR46 A Mesbah (340_CR43) 2018; 18 340_CR49 D Lin (340_CR40) 2011; 7 G Bouffard (340_CR15) 2015; 50 DH Habing (340_CR28) 1992; 39 AAK Sere (340_CR54) 2011; 5 340_CR55 340_CR52 340_CR53 |
| References_xml | – ident: CR22 – volume: 5 start-page: 49 issue: 2 year: 2011 end-page: 60 ident: CR54 article-title: Evaluation of countermeasures against fault publication-title: Int. J. Secur. Appl. – ident: CR49 – volume: 4 start-page: 211 issue: 3 year: 2008 end-page: 220 ident: CR13 article-title: Code obfuscation techniques for metamorphic viruses publication-title: J. Comput. Virol. doi: 10.1007/s11416-008-0084-2 – volume: 50 start-page: 33 year: 2015 end-page: 46 ident: CR15 article-title: The ultimate control flow transfer in a Java based smart card publication-title: Comput. Secur. doi: 10.1016/j.cose.2015.01.004 – ident: CR39 – ident: CR16 – ident: CR12 – ident: CR35 – volume: 25 start-page: 249 issue: 3 year: 2010 end-page: 279 ident: CR11 article-title: New trends in constraint satisfaction, planning, and scheduling: a survey publication-title: Knowl. Eng. Rev. doi: 10.1017/S0269888910000202 – ident: CR61 – ident: CR58 – volume: 100 start-page: 464 issue: 5 year: 1972 end-page: 471 ident: CR1 article-title: A deductive method for simulating faults in logic circuits publication-title: IEEE Trans. Comput. doi: 10.1109/T-C.1972.223542 – volume: 4 start-page: 412 year: 1967 end-page: 429 ident: CR31 article-title: Design and use of fault simulation for saturn computer design publication-title: IEEE Trans. Electron. Comput. doi: 10.1109/PGEC.1967.264644 – volume: 12 start-page: 74 issue: 8 year: 2012 end-page: 83 ident: CR51 article-title: Camouflage in malware: from encryption to metamorphism publication-title: Int. J. Comput. Sci. Netw. Secur. – ident: CR21 – ident: CR46 – ident: CR19 – volume: 7 start-page: 201 issue: 3 year: 2011 end-page: 214 ident: CR40 article-title: Hunting for undetectable metamorphic viruses publication-title: J. Comput. Virol. doi: 10.1007/s11416-010-0148-y – volume: 15 start-page: 243 issue: 4 year: 2001 end-page: 267 ident: CR45 article-title: Solution techniques for constraint satisfaction problems: foundations publication-title: Artif. Intell. Rev. doi: 10.1023/A:1011039901653 – volume: 39 start-page: 1647 year: 1992 end-page: 1653 ident: CR28 article-title: The use of lasers to simulate radiation-induced transients in semiconductor devices and circuits publication-title: IEEE Trans. Nuclear Sci. doi: 10.1109/23.211348 – ident: CR9 – volume: 18 start-page: 1 issue: 1 year: 2018 end-page: 16 ident: CR43 article-title: Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM publication-title: Int. J. Inf. Secur. – ident: CR36 – volume: 94 start-page: 370 issue: 2 year: 2006 end-page: 382 ident: CR4 article-title: The sorcerer’s apprentice guide to fault attacks publication-title: Proc. IEEE doi: 10.1109/JPROC.2005.862424 – ident: CR5 – volume: 7 start-page: 100 issue: 3 year: 2018 end-page: 110 ident: CR56 article-title: Challenge of malware analysis: malware obfuscation techniques publication-title: Int. J. Inf. Secur. Sci. – ident: CR64 – ident: CR26 – year: 2005 ident: CR10 publication-title: Constraint Propagation and Backtracking-Based Search – ident: CR18 – ident: CR66 – year: 1995 ident: CR60 publication-title: Foundations of Constraint Satisfaction – ident: CR14 – ident: CR37 – ident: CR53 – volume: 2 start-page: 1 issue: 2 year: 2018 end-page: 20 ident: CR67 article-title: Fault attacks on secure embedded software: threats, design, and evaluation publication-title: J. Hardw. Syst. Secur. doi: 10.1007/s41635-018-0038-1 – volume: 5 start-page: 56 issue: 02 year: 2014 ident: CR25 article-title: Malware analysis and classification: a survey publication-title: J. Inf. Secur. – ident: CR30 – ident: CR33 – ident: CR6 – start-page: 27 year: 2017 end-page: 47 ident: CR50 article-title: Fault attacks, injection techniques and tools for simulation publication-title: Hardware Security and Trust doi: 10.1007/978-3-319-44318-8_2 – volume: 122 start-page: 28 issue: 10 year: 2015 end-page: 33 ident: CR57 article-title: Detecting and classifying morphed malwares: a survey publication-title: Int. J. Comput. Appl. – ident: CR63 – volume: 40 start-page: 315 issue: 1 year: 2008 end-page: 319 ident: CR2 article-title: Defense against the dark arts publication-title: ACM SIGCSE Bull. doi: 10.1145/1352322.1352245 – ident: CR27 – ident: CR23 – volume: 13 start-page: 32 issue: 1 year: 1992 ident: CR38 article-title: Algorithms for constraint-satisfaction problems: a survey publication-title: AI Mag. – ident: CR44 – ident: CR48 – volume: 21 start-page: 2295 issue: 12 year: 2013 end-page: 2306 ident: CR34 article-title: Hardware designer’s guide to fault attacks publication-title: IEEE Trans. Very Large Scale Integr. (VLSI) Syst. doi: 10.1109/TVLSI.2012.2231707 – ident: CR65 – ident: CR3 – volume: 8 start-page: 689 year: 1978 end-page: 695 ident: CR42 article-title: Deductive fault simulation with functional blocks publication-title: IEEE Trans. Comput. doi: 10.1109/TC.1978.1675175 – ident: CR52 – volume: 7 start-page: 35 issue: 1 year: 2017 end-page: 46 ident: CR47 article-title: Buffer overflow attack with multiple fault injection and a proven countermeasure publication-title: J. Cryptogr. Eng. doi: 10.1007/s13389-016-0136-3 – volume: 8 start-page: 3 issue: 1 year: 2005 end-page: 40 ident: CR8 article-title: Randomized instruction set emulation publication-title: ACM Trans. Inf. Syst. Secur. (TISSEC) doi: 10.1145/1053283.1053286 – ident: CR55 – ident: CR7 – volume: 104 start-page: 72 year: 2018 end-page: 93 ident: CR32 article-title: Diversification and obfuscation techniques for software security: a systematic literature review publication-title: Inf. Softw. Technol. doi: 10.1016/j.infsof.2018.07.007 – ident: CR59 – volume: 18 start-page: 130 issue: 2–3 year: 2013 end-page: 137 ident: CR29 article-title: Virus in a smart card: Myth or reality? publication-title: J. Inf. Secur. Appl. – ident: CR41 – ident: CR62 – ident: CR24 – volume: 119 start-page: 557 issue: 3 year: 1999 end-page: 581 ident: CR17 article-title: Constraint satisfaction problems: algorithms and applications publication-title: Eur. J. Oper. Res. doi: 10.1016/S0377-2217(98)00364-6 – ident: CR20 – ident: 340_CR21 – volume: 122 start-page: 28 issue: 10 year: 2015 ident: 340_CR57 publication-title: Int. J. Comput. Appl. – ident: 340_CR7 doi: 10.1109/FDTC.2009.30 – ident: 340_CR33 doi: 10.1007/978-3-319-14123-7_15 – ident: 340_CR19 – ident: 340_CR48 – volume: 13 start-page: 32 issue: 1 year: 1992 ident: 340_CR38 publication-title: AI Mag. – volume: 25 start-page: 249 issue: 3 year: 2010 ident: 340_CR11 publication-title: Knowl. Eng. Rev. doi: 10.1017/S0269888910000202 – ident: 340_CR44 doi: 10.1109/ICEE-B.2017.8192164 – ident: 340_CR26 doi: 10.1007/1-4020-8147-2_11 – volume: 39 start-page: 1647 year: 1992 ident: 340_CR28 publication-title: IEEE Trans. Nuclear Sci. doi: 10.1109/23.211348 – volume: 18 start-page: 1 issue: 1 year: 2018 ident: 340_CR43 publication-title: Int. J. Inf. Secur. – volume: 7 start-page: 35 issue: 1 year: 2017 ident: 340_CR47 publication-title: J. Cryptogr. Eng. doi: 10.1007/s13389-016-0136-3 – volume-title: Constraint Propagation and Backtracking-Based Search year: 2005 ident: 340_CR10 – volume: 104 start-page: 72 year: 2018 ident: 340_CR32 publication-title: Inf. Softw. Technol. doi: 10.1016/j.infsof.2018.07.007 – start-page: 27 volume-title: Hardware Security and Trust year: 2017 ident: 340_CR50 doi: 10.1007/978-3-319-44318-8_2 – volume: 8 start-page: 689 year: 1978 ident: 340_CR42 publication-title: IEEE Trans. Comput. doi: 10.1109/TC.1978.1675175 – ident: 340_CR58 doi: 10.1007/3-540-36400-5_2 – ident: 340_CR18 doi: 10.1145/3230833.3230842 – ident: 340_CR61 doi: 10.1145/800153.804936 – ident: 340_CR3 – volume: 4 start-page: 211 issue: 3 year: 2008 ident: 340_CR13 publication-title: J. Comput. Virol. doi: 10.1007/s11416-008-0084-2 – ident: 340_CR20 doi: 10.1109/ISSRE.2010.26 – ident: 340_CR53 – volume: 100 start-page: 464 issue: 5 year: 1972 ident: 340_CR1 publication-title: IEEE Trans. Comput. doi: 10.1109/T-C.1972.223542 – volume: 2 start-page: 1 issue: 2 year: 2018 ident: 340_CR67 publication-title: J. Hardw. Syst. Secur. doi: 10.1007/s41635-018-0038-1 – volume: 7 start-page: 201 issue: 3 year: 2011 ident: 340_CR40 publication-title: J. Comput. Virol. doi: 10.1007/s11416-010-0148-y – ident: 340_CR62 doi: 10.1007/978-3-642-12510-2_10 – volume: 94 start-page: 370 issue: 2 year: 2006 ident: 340_CR4 publication-title: Proc. IEEE doi: 10.1109/JPROC.2005.862424 – ident: 340_CR55 doi: 10.5120/15544-4098 – ident: 340_CR46 doi: 10.1109/FDTC.2013.9 – ident: 340_CR64 – ident: 340_CR35 doi: 10.1145/948109.948146 – ident: 340_CR22 – ident: 340_CR36 doi: 10.1109/HST.2017.7951802 – ident: 340_CR27 doi: 10.1109/FDTC.2008.18 – volume: 5 start-page: 56 issue: 02 year: 2014 ident: 340_CR25 publication-title: J. Inf. Secur. – ident: 340_CR39 doi: 10.1007/978-3-642-37288-9_3 – ident: 340_CR65 – volume: 40 start-page: 315 issue: 1 year: 2008 ident: 340_CR2 publication-title: ACM SIGCSE Bull. doi: 10.1145/1352322.1352245 – ident: 340_CR5 doi: 10.1007/978-3-642-27257-8_19 – volume: 18 start-page: 130 issue: 2–3 year: 2013 ident: 340_CR29 publication-title: J. Inf. Secur. Appl. – volume-title: Foundations of Constraint Satisfaction year: 1995 ident: 340_CR60 – ident: 340_CR63 doi: 10.1145/1030083.1030097 – volume: 50 start-page: 33 year: 2015 ident: 340_CR15 publication-title: Comput. Secur. doi: 10.1016/j.cose.2015.01.004 – ident: 340_CR59 doi: 10.1109/FDTC.2016.18 – ident: 340_CR9 – ident: 340_CR52 doi: 10.1109/HST.2015.7140238 – ident: 340_CR23 – volume: 4 start-page: 412 year: 1967 ident: 340_CR31 publication-title: IEEE Trans. Electron. Comput. doi: 10.1109/PGEC.1967.264644 – ident: 340_CR14 doi: 10.1007/978-3-642-27257-8_18 – volume: 119 start-page: 557 issue: 3 year: 1999 ident: 340_CR17 publication-title: Eur. J. Oper. Res. doi: 10.1016/S0377-2217(98)00364-6 – volume: 21 start-page: 2295 issue: 12 year: 2013 ident: 340_CR34 publication-title: IEEE Trans. Very Large Scale Integr. (VLSI) Syst. doi: 10.1109/TVLSI.2012.2231707 – volume: 5 start-page: 49 issue: 2 year: 2011 ident: 340_CR54 publication-title: Int. J. Secur. Appl. – ident: 340_CR6 doi: 10.1007/978-3-642-12510-2_11 – ident: 340_CR49 – volume: 12 start-page: 74 issue: 8 year: 2012 ident: 340_CR51 publication-title: Int. J. Comput. Sci. Netw. Secur. – ident: 340_CR16 doi: 10.1007/978-3-642-27257-8_1 – ident: 340_CR30 – ident: 340_CR12 doi: 10.1145/948109.948151 – ident: 340_CR37 doi: 10.1109/FDTC.2014.11 – volume: 15 start-page: 243 issue: 4 year: 2001 ident: 340_CR45 publication-title: Artif. Intell. Rev. doi: 10.1023/A:1011039901653 – volume: 7 start-page: 100 issue: 3 year: 2018 ident: 340_CR56 publication-title: Int. J. Inf. Secur. Sci. – ident: 340_CR66 doi: 10.1109/BWCCA.2010.85 – ident: 340_CR24 – ident: 340_CR41 – volume: 8 start-page: 3 issue: 1 year: 2005 ident: 340_CR8 publication-title: ACM Trans. Inf. Syst. Secur. (TISSEC) doi: 10.1145/1053283.1053286 |
| SSID | ssj0001258765 ssj0054875 |
| Score | 2.1378694 |
| Snippet | Smart cards are very secure devices designed to execute applications and store confidential data. Therefore, they become the target of many hardware and... |
| SourceID | unpaywall hal proquest crossref springer |
| SourceType | Open Access Repository Aggregation Database Index Database Publisher |
| StartPage | 103 |
| SubjectTerms | Algorithms Computer Science Cryptography and Security Embedded Systems Original Paper Search process Smart cards Viruses |
| SummonAdditionalLinks | – databaseName: SpringerLINK - Czech Republic Consortium dbid: AGYKE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLZgOwAHxlMUBooQN9ZpfaRtjhNiVLxOTBqnKmlTMTGVibVD7NfjdO06EELs0kOfqZ3En-P4M8AFC9HqchHppjBUCTPH0llsRToT3OzEir4lj-A_PDp-374d0EGRFDYpd7uXIcl8pq6S3QwED-j6Ml2RqnT02TrUc76tGtS7N893y2srFAc5LXJkfn_4mx1af1G7IJcg5iIqugUbWTLmnx98NFoyPL0G9Msmz_ebvLazVLTD2Q82x1X_aQe2CyRKuvOuswtrMtmDRlnlgRSDfh8cf6jsG-Ek5tkoJTLPtorIdPieTUhR54eo1Hg8VHy0B9DvXT9d-XpRbUEPLdtLdWEjNog8Kjxh05CZoeUptMGl6Dg8jAQ6Si5il9iT0uLMkBKbHlGLqoJUXsRd6xBqyVsij4DEjBvSdmPsBtSOHYcbkZqZGcXZhLu2rcFlKftgPCfVCCr6ZCWSAEUS5CIJZhqco3oWNyo-bL97H6hzCDAM9Cjp1NCgWWovKEbhJFCRI6oIaJgGrVIB1eW_PtlaaP0fLTxe7e0nsGkqrz1fy2lCDRUjTxHapOKs6Mlf9Bvsrg priority: 102 providerName: Springer Nature |
| Title | Hiding a fault enabled virus through code construction |
| URI | https://link.springer.com/article/10.1007/s11416-019-00340-z https://www.proquest.com/docview/2402505999 https://inria.hal.science/hal-02416015 |
| UnpaywallVersion | submittedVersion |
| Volume | 16 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVLSH databaseName: SpringerLink Journals customDbUrl: mediaType: online eissn: 2263-8733 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001258765 issn: 2263-8733 databaseCode: AFBBN dateStart: 20051101 isFulltext: true providerName: Library Specific Holdings – providerCode: PRVAVX databaseName: SpringerLINK - Czech Republic Consortium customDbUrl: eissn: 2263-8733 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001258765 issn: 2263-8733 databaseCode: AGYKE dateStart: 20120101 isFulltext: true titleUrlDefault: http://link.springer.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 2263-8733 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0054875 issn: 2263-8733 databaseCode: U2A dateStart: 20051128 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLbYdgAOvBHjMUWIG2SsTdM2xwoBEy9xYBKcqqRNNcRUEHsg9utxunQDDjwuVdVGbeovie06_gxwIBLUulKl1FWOKWHmMyoyllKhpNvKDH1LEcG_vvHbHe_int_bDbJFLkyOcm920e60GuAYzykqEgc9B16Bms_R5q5CrXNzGz2YynEuPj4MGLMZMZO8OAfbo5csqOFfadHxF61T6Zo9j58MymkMdBHmh_mLfH-Tvd4nNXO2DOdlBye7S56aw4FqJuNv3I2_f8EKLFlLk0STobEKczpfg-WyigOxk3od_Paj0V9EkkwOewOii2yqlIweX4d9Yuv4EJP6jocZ3-wGdM5O707a1FZToAnzwgFVHur-NOQqVB5PhJuw0FgTUquWL5NUoSMUoG2ShVozKRytUYYpZ9wUnApTGbBNqObPud4CkgnpaC_IEGbuZb4vndSsvILjaiEDz6vDYSnt-GVCmhHP6JENNjFiExfYxOM67KOEpg0N33U7uorNtVJqI6cOuyVesZ1l_dhEhrghmBF1OCoxnN3-6ZVHU5z_0MPt_zXfgQXXeOXFv5pdqCIweg9Nl4FqQC06f7g8bUCl40YNO4o_AKp_6DY |
| linkProvider | Unpaywall |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLZgOwwOjKcYzwhxg6K1TbrmOCGgwLbTJo1TlLSpQEwFsQ7Efj1O124DIcQuPfSZ2kn8OY4_A5zyEK2uVJHlKNuUMPNci8duZHElnXps6FuyCH674wU9etdn_TwpbFjsdi9CktlMPUt2sxE8oOvLLUOqUrfGy1Cm6KA4JSg3bx7u59dWGA5ylufI_P7wNzu0_Gh2Qc5BzGlUdBUqo-RVfn7IwWDO8FxXoVc0ebLf5PlilKqLcPyDzXHRf1qHtRyJkuak62zAkk42oVpUeSD5oN8CL3gy9o1IEsvRICU6y7aKyPvT22hI8jo_xKTG42HGR7sNveur7mVg5dUWrNClfmopitgg8pnyFWUhd0LXN2hDalX3ZBgpdJQaiF1iX2tXcltrbHrEXGYKUvmRbLg7UEpeEr0LJObS1rQRYzdgNPY8aUdmZuYMZxPZoLQGZ4XsxeuEVEPM6JONSASKRGQiEeManKB6pjcaPuyg2RLmHAIMGz1K9m7X4KDQnshH4VCYyBEzBDS8BueFAmaX__rk-VTr_2jh3mJvP4ZK0G23ROu2c78PK47x4LN1nQMooZL0IcKcVB3lvfoLDSnvjQ |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT8MwDLaASTwOjKcYDIgQN-hY16ZtjhMwxmviwCQ4RUmTCsRUJuiG2K_H6dptIIRAXHroM42d-HMcfwbYZyFaXSGVVZO2KWHmORaLHGUxKWrVyNC3pBH865bXbLsXd_RuIos_3e2ehySHOQ2GpSlOjroqOhonvtkIJNANZpYhWKlag2kooGvio6YX6mf3l5PrLBQHPM3yZb5_-JNNmn4wOyIn4OYoQroAc724K97fRKczYYQaRRB584d7T54qvURWwsEXZsf__N8SLGYIldSHKrUMUzpegWJe_YFkk8EqeM1HY_eIIJHodRKi0ywsRfqPL71XktX_ISZlHg9jnto1aDdOb4-bVlaFwQodN0gs6SJmUAGVgXRpyGqhExgUIrSseiJUEh0oHzFNFGjtCGZrjU1X1KGmUFWghO-sw0z8HOsNIBETtnb9CNWDupHnCVuZGZtRnGWE77olOMjlwLtDsg0-plU2XcKxS3jaJXxQgj0U1ehGw5PdrF9xcw6Bh42eJu3bJSjnkuTZ6HzlJqJEDTENK8FhLozx5Z8-eTjSgF-0cPNvb9-F2ZuTBr86b11uwXzNOPbpck8ZZlBGehvRTyJ3MgX_ACjp-HE |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLZgOwAH3ojxUoS4sYy1adrmOCFgQoA4MGmcqqRNtYmpTOyB2K_H6dJtcOBxqao2alN_SWzX8WeAMxGj1pUqoa5yTAkzn1GRsoQKJd16auhb8gj-_YPfbHm3bd62G2TzXJgM5V7roN1pNcAFnlNUJA56DnwZyj5Hm7sE5dbDY-PZVI5z8fFhwJjNiJnmxTnYHr1kQQ3_Sp1Ovmid5Y7Z87hgUM5ioGuwMsr68uNd9noLauZ6A26KDk53l7zURkNViyffuBt__4JNWLeWJmlMh8YWLOlsGzaKKg7ETuod8Jtdo7-IJKkc9YZE59lUCRl330YDYuv4EJP6joc53-wutK6vni6b1FZToDHzwiFVHur-JOQqVB6PhRuz0FgTUqu6L-NEoSMUoG2ShlozKRytUYYJZ9wUnAoTGbA9KGWvmd4HkgrpaC9IEWbupb4vncSsvILjaiEDz6vAeSHtqD8lzYjm9MgGmwixiXJsokkFTlFCs4aG77rZuIvMtUJqY6cCRwVekZ1lg8hEhrghmBEVqBYYzm__9MrqDOc_9PDgf80PYdU1Xnn-r-YISgiMPkbTZahO7Lj9BAw05bk |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Hiding+a+fault+enabled+virus+through+code+construction&rft.jtitle=Journal+of+Computer+Virology+and+Hacking+Techniques&rft.au=Hamadouche+Samiya&rft.au=Jean-Louis%2C+Lanet&rft.au=Mezghiche+Mohamed&rft.date=2020-06-01&rft.pub=Springer+Nature+B.V&rft.issn=2263-8733&rft.eissn=2263-8733&rft.volume=16&rft.issue=2&rft.spage=103&rft.epage=124&rft_id=info:doi/10.1007%2Fs11416-019-00340-z&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2263-8733&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2263-8733&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2263-8733&client=summon |