earticle

논문검색

Evaluation of Countermeasures Against Fault

원문정보

초록

영어

Java Card are devices subject to either hardware and software attacks. Thus several countermeasures need to be embedded to avoid the effects of these attacks. Recently, the idea to combine logical attacks with a physical attack to bypass bytecode verification has emerged. For instance, correct and legitimate Java Card applications can be dynamically modified on-card using laser beam. Such applications become mutant applications, with a different behavior. This internal change could lead to bypass control and protection and thus should offer illegal access to secret data and operation inside the chip. In this paper, we propose a set of countermeasures that can be activated by the developer using the annotation mechanism. These countermeasures are efficient but also affordable for the smart card domain, as shown by the evaluation of the coverage and memory usage.

목차

Abstract
 1. Introduction
 2. Fault Attacks
 3. Defining a Mutant Application
 4. Software Countermeasures on Smart Card
  4.1. General Idea Behind the Proposed Countermeasures
  4.2. First Detection Mechanism: The Field of Bit (FoB)
  4.3. Second Detection Mechanism: The Basic Block (BB)
  4.4 Third Detection Mechanism: The Path Checking (PC)
 5. Evaluations
  5.1. Runtime Overhead
  5.2. Detection Efficiency
 6. Future Works: Compression Detection Mechanism
 7. Conclusions
 References

저자정보

  • Ahmadou A. SERE SSD - XLIM Labs, University of Limoges JIDE
  • Julien Iguchi-Cartigny SSD - XLIM Labs University of Limoges JIDE
  • Jean-Louis Lanet SSD - XLIM Labs University of Limoges JIDE

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.