{"id":"https://openalex.org/W2342752370","doi":"https://doi.org/10.5220/0005682202820289","title":"An Observe-and-Detect Methodology for the Security and Functional Testing of Smart Card Applications","display_name":"An Observe-and-Detect Methodology for the Security and Functional Testing of Smart Card Applications","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2342752370","doi":"https://doi.org/10.5220/0005682202820289","mag":"2342752370"},"language":"en","primary_location":{"id":"doi:10.5220/0005682202820289","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005682202820289","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0005682202820289","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042946763","display_name":"Germain Jolly","orcid":null},"institutions":[{"id":"https://openalex.org/I98702875","display_name":"Universit\u00e9 de Caen Normandie","ror":"https://ror.org/051kpcy16","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210105918","https://openalex.org/I98702875"]},{"id":"https://openalex.org/I4210139483","display_name":"GREYC","ror":"https://ror.org/043749971","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I194210350","https://openalex.org/I4210105918","https://openalex.org/I4210105918","https://openalex.org/I4210139483","https://openalex.org/I4210159245","https://openalex.org/I98702875"]},{"id":"https://openalex.org/I194210350","display_name":"\u00c9cole Nationale Sup\u00e9rieure d'Ing\u00e9nieurs de Caen","ror":"https://ror.org/01fpqqe90","country_code":"FR","type":"education","lineage":["https://openalex.org/I194210350","https://openalex.org/I4210105918"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Germain Jolly","raw_affiliation_strings":["Universite de Caen Basse Normandie; ENSICAEN; UMR 6072 GREYC, France"],"affiliations":[{"raw_affiliation_string":"Universite de Caen Basse Normandie; ENSICAEN; UMR 6072 GREYC, France","institution_ids":["https://openalex.org/I98702875","https://openalex.org/I194210350","https://openalex.org/I4210139483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022760698","display_name":"Sylvain Vernois","orcid":null},"institutions":[{"id":"https://openalex.org/I98702875","display_name":"Universit\u00e9 de Caen Normandie","ror":"https://ror.org/051kpcy16","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210105918","https://openalex.org/I98702875"]},{"id":"https://openalex.org/I194210350","display_name":"\u00c9cole Nationale Sup\u00e9rieure d'Ing\u00e9nieurs de Caen","ror":"https://ror.org/01fpqqe90","country_code":"FR","type":"education","lineage":["https://openalex.org/I194210350","https://openalex.org/I4210105918"]},{"id":"https://openalex.org/I4210139483","display_name":"GREYC","ror":"https://ror.org/043749971","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I194210350","https://openalex.org/I4210105918","https://openalex.org/I4210105918","https://openalex.org/I4210139483","https://openalex.org/I4210159245","https://openalex.org/I98702875"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Sylvain Vernois","raw_affiliation_strings":["Universite de Caen Basse Normandie; ENSICAEN; UMR 6072 GREYC, France"],"affiliations":[{"raw_affiliation_string":"Universite de Caen Basse Normandie; ENSICAEN; UMR 6072 GREYC, France","institution_ids":["https://openalex.org/I98702875","https://openalex.org/I194210350","https://openalex.org/I4210139483"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079967426","display_name":"Christophe Rosenberger","orcid":"https://orcid.org/0000-0002-2042-9029"},"institutions":[{"id":"https://openalex.org/I194210350","display_name":"\u00c9cole Nationale Sup\u00e9rieure d'Ing\u00e9nieurs de Caen","ror":"https://ror.org/01fpqqe90","country_code":"FR","type":"education","lineage":["https://openalex.org/I194210350","https://openalex.org/I4210105918"]},{"id":"https://openalex.org/I4210139483","display_name":"GREYC","ror":"https://ror.org/043749971","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I194210350","https://openalex.org/I4210105918","https://openalex.org/I4210105918","https://openalex.org/I4210139483","https://openalex.org/I4210159245","https://openalex.org/I98702875"]},{"id":"https://openalex.org/I98702875","display_name":"Universit\u00e9 de Caen Normandie","ror":"https://ror.org/051kpcy16","country_code":"FR","type":"education","lineage":["https://openalex.org/I4210105918","https://openalex.org/I98702875"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Christophe Rosenberger","raw_affiliation_strings":["Universite de Caen Basse Normandie; ENSICAEN; UMR 6072 GREYC, France"],"affiliations":[{"raw_affiliation_string":"Universite de Caen Basse Normandie; ENSICAEN; UMR 6072 GREYC, France","institution_ids":["https://openalex.org/I98702875","https://openalex.org/I194210350","https://openalex.org/I4210139483"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5042946763"],"corresponding_institution_ids":["https://openalex.org/I98702875","https://openalex.org/I4210139483","https://openalex.org/I194210350"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.02165476,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"282","last_page":"289"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8236239552497864},{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.7983672618865967},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.7527550458908081},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6213645339012146},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5681076645851135},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.47687894105911255},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.47107449173927307},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.46669724583625793},{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.45609840750694275},{"id":"https://openalex.org/keywords/smart-card-application-protocol-data-unit","display_name":"Smart card application protocol data unit","score":0.42422330379486084},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.37191444635391235},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32798248529434204},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.26420652866363525},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.10060977935791016}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8236239552497864},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.7983672618865967},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.7527550458908081},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6213645339012146},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5681076645851135},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.47687894105911255},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.47107449173927307},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.46669724583625793},{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.45609840750694275},{"id":"https://openalex.org/C151340760","wikidata":"https://www.wikidata.org/wiki/Q602456","display_name":"Smart card application protocol data unit","level":3,"score":0.42422330379486084},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37191444635391235},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32798248529434204},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.26420652866363525},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10060977935791016},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0005682202820289","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005682202820289","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0005682202820289","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005682202820289","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.550000011920929,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W960661423","https://openalex.org/W2372548850","https://openalex.org/W2031789667","https://openalex.org/W1521357161","https://openalex.org/W2614190601","https://openalex.org/W2492716025","https://openalex.org/W2077510223","https://openalex.org/W1579379285","https://openalex.org/W2123337410","https://openalex.org/W1505989177"],"abstract_inverted_index":{"Smart":[0],"cards":[1],"are":[2,8,74,103],"tamper":[3],"resistant":[4],"devices":[5],"but":[6],"vulnerabilities":[7],"sometimes":[9],"discovered.":[10],"We":[11,28],"address":[12],"in":[13,25,80],"this":[14,97,108],"paper":[15],"the":[16,19,34,57,60,68,81,86,93,100,115,133,143],"security":[17],"and":[18,38,84,92,126],"functional":[20],"testing":[21],"of":[22,36,59,89,107,117,123,149],"embedded":[23],"applications":[24,37],"smart":[26,69],"cards.":[27],"propose":[29],"an":[30,90,121,124,147,150],"original":[31],"methodology":[32],"for":[33],"evaluation":[35,82],"we":[39,139],"show":[40,137],"its":[41],"benefit":[42],"by":[43,131],"comparing":[44],"it":[45],"to":[46,113,119,136],"a":[47,77,110,127],"classical":[48],"certification":[49],"process.":[50],"The":[51],"proposed":[52,144],"method":[53,79,135],"is":[54],"based":[55],"on":[56],"observation":[58],"APDU":[61],"(Application":[62],"Protocol":[63],"Data":[64],"unit)":[65],"communication":[66],"with":[67,142],"card.":[70],"Some":[71],"specific":[72],"properties":[73,118],"verified":[75],"as":[76],"complementary":[78],"process":[83],"allows":[85],"on-the-fly":[87],"detection":[88],"anomaly":[91,98],"reasons":[94],"that":[95],"triggered":[96],"during":[99],"test.":[101],"Here":[102],"presented":[104],"two":[105],"uses":[106],"method:":[109],"simple":[111],"use":[112,116],"illustrate":[114],"verify":[120],"implementation":[122],"application":[125],"more":[128],"complex":[129],"illustration":[130],"applying":[132],"fuzzing":[134],"what":[138],"can":[140],"obtain":[141],"approach,":[145],"i.e.":[146],"analysis":[148],"anomaly.":[151]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
