Affordable Access

Download Read

Malicious Code on Java Card Smartcards: Attacks and Countermeasures

IFIP Lecture Notes in Computer Science (LNCS)


When it comes to security, an interesting difference between Java Card and regular Java is the absence of an on-card bytecode verifier on most Java Cards. In principle this opens up the possibility of malicious, ill-typed code as an avenue of attack, though the Java Card platform offers some protection against this, notably by code signing.Full Text at Springer, may require registration or fee

There are no comments yet on this publication. Be the first to share your thoughts.