2015
DOI: 10.1007/978-3-319-16763-3_2
|View full text |Cite
|
Sign up to set email alerts
|

Heap $$\ldots $$ Hop! Heap Is Also Vulnerable

Abstract: Several logical attacks against Java based smart card have been published recently. Most of them are based on the hypothesis that the type verification was not performed, thus allowing to obtain dynamically a type confusion. To mitigate such attacks, typed stack have been introduced on recent smart card. We propose here a new attack path for performing a type confusion even in presence of a typed stack. Then we propose using a Fault Tree Analysis a way to design efficiently counter measure in a top down approa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…These hardware blocks aim at protecting the runtime environment. Lackner et al designed mitigation to prevent type confusion onto the stack [24,25] and the heap [8]. In his master's thesis, Zelle [46] describes how to protect the Java Card firewall through a Memory Protection Unit (MPU).…”
Section: Related Workmentioning
confidence: 99%
“…These hardware blocks aim at protecting the runtime environment. Lackner et al designed mitigation to prevent type confusion onto the stack [24,25] and the heap [8]. In his master's thesis, Zelle [46] describes how to protect the Java Card firewall through a Memory Protection Unit (MPU).…”
Section: Related Workmentioning
confidence: 99%