Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM
Crossref DOI link: https://doi.org/10.1007/s10207-018-0401-9
Published Online: 2018-02-22
Published Print: 2019-02
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Mesbah, Abdelhak
Lanet, Jean-Louis
Mezghiche, Mohamed
Text and Data Mining valid from 2018-02-22
Article History
First Online: 22 February 2018