M. Witteman, Java Card Security, In: Information Security Bulletin, vol.8, pp.291-298, 2003.

W. Mostowski and E. Poll, Malicious Code on Java Card Smartcards: Attacks and Countermeasures, Smart Card Research and Advanced Applications. CARDIS '08, pp.1-16, 2008.
DOI : 10.1007/978-3-540-30569-9_7

J. Iguchi-cartigny and J. L. Lanet, Developing a Trojan applets in a smart card, Journal in Computer Virology, vol.8, issue.2, pp.343-351, 2010.
DOI : 10.1007/s11416-009-0135-3

C. Giraud and H. Thiebeauld, A Survey on Fault Attacks
DOI : 10.1007/1-4020-8147-2_11

R. Anderson and M. Kuhn, Tamper Resistance: a Cautionary Note, Proceedings of the Second USENIX Workshop on Electronic Commerce, pp.1-1, 1996.

D. Boneh, R. A. Demillo, and R. J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, Proceedings of the 16th Annual International Conference on Theory and Application of Cryptographic Techniques. EU- ROCRYPT'97, pp.37-51, 1997.
DOI : 10.1007/3-540-69053-0_4

E. Bihame and A. Shamir, Differential fault analysis of secret key cryptosystems, Advances in Cryptology. CRYPTO'97, pp.513-525, 1997.
DOI : 10.1007/BFb0052259

H. Bar-el, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan, The Sorcerer's Apprentice Guide to Fault Attacks, Proceedings of the IEEE, vol.94, issue.2, pp.370-382, 2006.
DOI : 10.1109/JPROC.2005.862424

G. Barbu, Fault Attacks on Java Card 3 Virtual Machine In: e-Smart'09, http://www.strategiestm-net.com/proceedings/e-smart, 2009.

G. Barbu, H. Thiebeauld, and V. Guerin, Attacks on Java Card 3.0 Combining Fault and Logical Attacks, Smart Card Research and Advanced Application. CARDIS'10, pp.148-163, 2010.
DOI : 10.1007/978-3-642-12510-2_11

URL : https://hal.archives-ouvertes.fr/hal-00692165

E. Vétillard and A. Ferrari, Combined Attacks and Countermeasures, pp.10-133, 2010.
DOI : 10.1007/978-3-642-12510-2_10

T. Lindholm and F. Yellin, Java Virtual Machine Specification, 1999.

K. Hyppönen, Use of Cryptographic Codes for Bytecode Verification in Smartcard Environment, 2003.

J. Hogenboom and W. Mostowski, Full Memory Attack on a Java Card, 4th Benelux Workshop on Information and System Security , Proceedings, 2009.

I. Iec, Identification Cards ? Integrated Circuit Cards ? Part 3: Cards with Contacts ? Electrical Interface and Transmission Protocols, pp.7816-7819, 2006.

S. Govindavajhala and A. W. Appel, Using memory errors to attack a virtual machine, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), 2003.
DOI : 10.1109/SECPRI.2003.1199334