23 3.2.1 Vérification de structure, p.24 ,
30 3.4.2.1 Critères sur les transitions et lesévénementslesévénements ,
ProB: A Model Checker for B, FME 2003 : Formal Methods, pp.855-874978, 1007. ,
DOI : 10.1007/978-3-540-45236-2_46
Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures, Cryptographic hardware and embedded systems -CHES 2002, pp.260-275, 2003. ,
DOI : 10.1007/3-540-36400-5_20
A differential fault attack technique against SPN structures, with application to the AES and KHAZAD Hardware and Embedded Systems-CHES, pp.77-88, 2003. ,
Attacks on Java Card 3.0 Combining Fault and Logical Attacks, pp.148-163, 2010. ,
DOI : 10.1007/978-3-642-12510-2_11
URL : https://hal.archives-ouvertes.fr/hal-00692165
Fuzzing on the HTTP protocol implementation in mobile embedded web server, Proceeding of C&ESAR, p.125, 2011. ,
Analysis vulnerabilities in smart card web server, SAR-SSI 2011 Network and Information Systems Security, 2011. ,
Malicious Code on Java Card Smartcards: Attacks and Countermeasures, Smart Card Research and Advanced Applications ,
DOI : 10.1007/978-3-540-30569-9_7
Transactions and non-atomic API methods in Java Card : specification ambiguity and strange implementation behaviours, pp.1-22 ,
Testing the Java Card Applet Firewall, Tech. Rep, 2007. ,
A dynamic syntax interpretation for java based smart card to mitigate logical attacks, Communications in Computer and Information Science, pp.185-194, 2012. ,
Developing a Trojan applets in a smart card, Journal in Computer Virology, vol.8, issue.2, pp.343-351, 2010. ,
DOI : 10.1007/s11416-009-0135-3
Combined Software and Hardware Attacks on the Java Card Control Flow, Lecture Notes in Computer Science LNCS, vol.707910, pp.283-296978, 1007. ,
DOI : 10.1007/978-3-642-27257-8_18
URL : https://hal.archives-ouvertes.fr/hal-00684616
Detecting Laser Fault Injection for Smart Cards Using Security Automata, Security in Computing and Communications, ser. Communications in Computer and Information Science, pp.18-29, 2013. ,
DOI : 10.1007/978-3-642-40576-1_3
URL : https://hal.archives-ouvertes.fr/hal-00966373
Guide de la sûreté de fonctionnement.Cépadù es Available : http://scholar.google.com/scholar?hl=en&btnG=Search&q=intitle: Guide+de+la+S\unhbox\voidb@x\bgroup\let\unhbox\voidb@x\setbox\ @tempboxa\hbox{u\global\mathchardef\accent@spacefactor\spacefactor} \accent94u\egroup\spacefactor\accent@spacefactorret\unhbox\voidb@x\bgroup\ let\unhbox\voidb@x\setbox\@tempboxa\hbox{e\global\mathchardef\accent@ spacefactor\spacefactor}\accent19e\egroup\spacefactor\accent@spacefactor+de+ fonctionnement#0, 1995. ,
Java Virtual Machine Specification, 1999. ,
On the security of Java : The Java bytecode verifier, 1999. ,
Formalizing the safety of Java, the Java virtual machine, and Java card, OOPSLA Proceeedings, pp.517-558, 1999. ,
DOI : 10.1145/503112.503115
A specification of Java loading and bytecode verification, Proceedings of the 5th ACM conference on Computer and communications security , CCS '98, pp.49-58, 1998. ,
DOI : 10.1145/288090.288104
is type-safe---definitely, Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '98, pp.161-170, 1998. ,
DOI : 10.1145/268946.268960
CartesàCartes`Cartesà puce et méthodes formelles, une lente intégration, Technique et Sciences Informatique, pp.959-964, 2001. ,
Construction correcte de logiciels pour cartè a puce These de doctorat, Université d'Aix-Marseille II Development of an embedded verifier for Java Card byte code using formal methods, FME 2002 : Formal Methods?Getting IT Right, 2002. ,
How to formally specify the java bytecode semantics using the b method, Proceedings of the Workshop on Object-Oriented Technology, pp.104-105, 1007. ,
Modeling the Java Bytecode Verifier, Modeling the Java Bytecode Verifier, pp.327-342, 2011. ,
DOI : 10.1016/j.scico.2011.03.008
A fortran language system for mutation-based software testing Software : Practice and Experience, pp.685-718, 1991. ,
Design of Mutant Operators for the C Programming Language Mutation Operators for Ada, Tech. Rep. Reliable Software Technologies Corps., Tech. Rep, 1989. ,
The Rigorous Generation of Java Mutation Operators Using HAZOP, Tech. Rep, 1999. ,
A Denial of Service Attack on the Java Bytecode Verifier, 2003. ,
Die Sicherheitsaspekte von mobilem Code, 2001. ,
A systematic review of state-based test tools, International Journal on Software Tools for Technology Transfer, vol.45, issue.3, pp.59-76, 2015. ,
DOI : 10.1007/s10009-013-0291-0
Practical Model Based Testing : A Tools Approach, 2007. ,
A subset of precise UML for model-based testing in model-based testing, ser. A-MOST '07, Proceedings of the 3rd international workshop on Advances, pp.95-104, 2007. ,
TestEra: Specification-Based Testing of Java Programs Using SAT, Automated Software Engineering, vol.11, issue.4, pp.403-434, 2004. ,
DOI : 10.1023/B:AUSE.0000038938.10589.b9
Model-based Mutation Testing with Timed Automata, pp.1-21, 2013. ,
T-uppaal : online model-based testing of real-time systems, Proceedings. 19th International Conference on Automated Software Engineering, 2004., pp.396-397, 2004. ,
DOI : 10.1109/ASE.2004.1342774
Model-based testing using scenarios and event-B refinements, " in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp.177-195, 2009. ,
A taxonomy of model-based testing approaches, Software Testing Verification and Reliability, pp.297-312, 2012. ,
DOI : 10.1002/stvr.456
URL : https://hal.archives-ouvertes.fr/hal-00940611
Model-Based Security Testing : A Taxonomy and Systematic Classification Software Testing, Verification and Reliability, 2015. ,
Une méthodologie de génération automatique de suite de tests pour applets Java Card, 2001. ,
An Access Control Model Based Testing Approach for Smart Card Applications : Results of the {POSÉ}{POS´{POSÉ} Project, JIAS, Journal of Information Assurance and Security, vol.5, pp.335-351, 2010. ,
LEIRIOS Test Generator : Automated Test Generation from B Models Formal Specification and Development in B, pp.277-280, 1007. ,
Mastering Test Generation from Smart Card Software Formal Models Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, pp.70-85, 2005. ,
Automatic Testing from Formal Specifications, Tests and Proofs, pp.95-113, 2007. ,
DOI : 10.1007/978-3-540-73770-4_6
ProTest: An Automatic Test Environment for B Specifications, Electronic Notes in Theoretical Computer Science, vol.111, pp.113-136, 2005. ,
DOI : 10.1016/j.entcs.2004.12.009
Applying Model Checking to Generate Model-Based Integration Tests from Choreography Models, Lecture Notes in Computer Science, vol.15, issue.5, pp.179-194, 2009. ,
DOI : 10.1109/52.714817
Program testing by specification mutation, Computer Languages, vol.10, issue.1, pp.63-73, 1985. ,
DOI : 10.1016/0096-0551(85)90011-6
Test Case Generation by OCL Mutation and Constraint Solving, Fifth International Conference on Quality Software (QSIC'05), pp.64-71, 2005. ,
DOI : 10.1109/QSIC.2005.63
Challenging formal specifications by mutation: a CSP security example, Tenth Asia-Pacific Software Engineering Conference, 2003., 2003. ,
DOI : 10.1109/APSEC.2003.1254388
Mutation of Model Checker Specifications for Test Generation and Evaluation, Mutation Testing for the New Century, pp.14-20, 2001. ,
DOI : 10.1007/978-1-4757-5939-6_5
1007/978-1-4757-5939-6 5http ,
Combinatorial Interaction Testing of a Java Card Static Verifier, 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation Workshops, pp.84-87, 2014. ,
DOI : 10.1109/ICSTW.2014.10
Virtual machine specification Java Card platform, 2009. ,
Modeling in Event-B : system and software engineering, 2010. ,
DOI : 10.1017/CBO9781139195881
Network flows, 1993. ,
Security Vulnerabilities Tests Generation from SysML and Event-B Models for EMV Cards, International Journal of Security and Its Applications, vol.8, issue.1, pp.373-388, 2013. ,
DOI : 10.14257/ijsia.2014.8.1.35
Génération de tests de vulnérabilité pour la structure des fichiers cap en java card, 2015. ,
Model-Based Robustness Testing in Event-B Using Mutation, Software Engineering and Formal Methods : 13th International Conference, SEFM 2015, pp.132-147, 2015. ,
DOI : 10.1007/978-3-319-22969-0_10
URL : https://hal.archives-ouvertes.fr/hal-01250594
Detecting Vulnerabilities in Java-Card Bytecode Verifiers Using Model-Based Testing, Integrated Formal Methods (IFM) LNCS, vol.7940, pp.223-237, 2013. ,
DOI : 10.1007/978-3-642-38613-8_16
URL : https://hal.archives-ouvertes.fr/hal-00981816
The Java Virtual Machine Specification Java SE 7 Edition, 2014. ,
CartesàCartes`Cartesà puce : Attaques et contremesures, MajecSTIC, vol.16, 2009. ,
Vtg ? vulnerability test generator, a plug-in for rodin, p.2012 ,
URL : https://hal.archives-ouvertes.fr/hal-00981811
Piratons formellement des cartesàcartes`cartesà puce, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00981810
Toolbox for penetration testing based on rodin and prob, 2014. ,