원문정보
Attacks on Smart Cards
초록
영어
Java Card are devices subject to either hardware and software attacks. Thus several countermeasures need to be embedded to avoid the effects of these attacks. Recently, the idea to combine logical attacks with a physical attack to bypass bytecode verification has emerged. For instance, correct and legitimate Java Card applications can be dynamically modified on-card using laser beam. Such applications become mutant applications, with a different behavior. This internal change could lead to bypass control and protection and thus should offer illegal access to secret data and operation inside the chip. In this paper, we propose a set of countermeasures that can be activated by the developer using the annotation mechanism. These countermeasures are efficient but also affordable for the smart card domain, as shown by the evaluation of the coverage and memory usage.
목차
1. Introduction
2. Fault Attacks
3. Defining a Mutant Application
4. Software Countermeasures on Smart Card
4.1. General Idea Behind the Proposed Countermeasures
4.2. First Detection Mechanism: The Field of Bit (FoB)
4.3. Second Detection Mechanism: The Basic Block (BB)
4.4 Third Detection Mechanism: The Path Checking (PC)
5. Evaluations
5.1. Runtime Overhead
5.2. Detection Efficiency
6. Future Works: Compression Detection Mechanism
7. Conclusions
References