International audienceThe electronic payment transaction involves the use of a smart card. A card application is a software, corresponding to standards and non-proprietary and proprietary specifications, and is stored in the smart card. Despite increased security with Europay Mastercard Visa (EMV) specifications, attacks still exist due to anomalies in the card application. The validation of the card application enables the detection of any anomaly, improving the overall security of electronic payment transactions. Among the different ways of validating a card application, we can use the verification of required behaviors. These behavior can be materialized as properties of commands sent by the terminal and responses from the smart card, us...
Modern multi-application smart cards can become an integrated environment where applications from di...
Abstract — CREDIT CARD has been widely used and simultaneously its malfunctioning as well as most im...
International audienceSmart card are often the target of software or hardware attacks. The most rece...
International audienceSmart cards are tamper resistant devices but vulnerabilities are sometimes dis...
International audienceElectronic payment transactions using smart card are based on the Europay Mast...
In the next years, smart cards are going to become the main personal identification document in many...
ENGELSK: More and more companies are digitizing their services, this is because their customers dema...
Smart-cards are considered to be one of the most secure, tamper-resistant, and trusted devices for i...
International audienceIn this paper, we propose to use fuzzing techniques to discover vulnerabilitie...
This thesis deals with the methods of evaluation of high level, close to the applications. A method ...
This paper discusses the development and research for the detection of fraud in smart-card environme...
International audienceWe propose a formal framework based on the B method, that supports the develop...
Modern multi-application smart cards can become an integrated environment where applications from di...
Abstract — CREDIT CARD has been widely used and simultaneously its malfunctioning as well as most im...
International audienceSmart card are often the target of software or hardware attacks. The most rece...
International audienceSmart cards are tamper resistant devices but vulnerabilities are sometimes dis...
International audienceElectronic payment transactions using smart card are based on the Europay Mast...
In the next years, smart cards are going to become the main personal identification document in many...
ENGELSK: More and more companies are digitizing their services, this is because their customers dema...
Smart-cards are considered to be one of the most secure, tamper-resistant, and trusted devices for i...
International audienceIn this paper, we propose to use fuzzing techniques to discover vulnerabilitie...
This thesis deals with the methods of evaluation of high level, close to the applications. A method ...
This paper discusses the development and research for the detection of fraud in smart-card environme...
International audienceWe propose a formal framework based on the B method, that supports the develop...
Modern multi-application smart cards can become an integrated environment where applications from di...
Abstract — CREDIT CARD has been widely used and simultaneously its malfunctioning as well as most im...
International audienceSmart card are often the target of software or hardware attacks. The most rece...