2006
DOI: 10.1007/11889700_21
|View full text |Cite
|
Sign up to set email alerts
|

Java Type Confusion and Fault Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 19 publications
0
9
0
Order By: Relevance
“…Because the attacker has overwritten the vtable pointer in the freed object, this method call will jump to an address of the attacker's choosing, as specified by their counterfeit vtable. Exploiting such use-after-free errors is just one way to launch vtable hijakcing attacks, others include traditional buffer overflows on the stack or the heap [4] and type confusion [5], [6] attacks. Unfortunately, such vtable hijacking attacks are no longer merely a hypothetical threat [7], [8].…”
Section: Introductionmentioning
confidence: 99%
“…Because the attacker has overwritten the vtable pointer in the freed object, this method call will jump to an address of the attacker's choosing, as specified by their counterfeit vtable. Exploiting such use-after-free errors is just one way to launch vtable hijakcing attacks, others include traditional buffer overflows on the stack or the heap [4] and type confusion [5], [6] attacks. Unfortunately, such vtable hijacking attacks are no longer merely a hypothetical threat [7], [8].…”
Section: Introductionmentioning
confidence: 99%
“…To be able to execute Java applets, the VM uses internal data structures, such as the OS or the LV, to store interim results of logical and combinatorial operations. All of these internal data structures are general objects for adversaries that attack the Java Card [4,20,24]. For every method invocation performed by the VM, a new Java frame [19] is created.…”
Section: Java Card Virtual Machinementioning
confidence: 99%
“…This influence is abused by an FA to change the normal control and data flow of the integrated circuit. Such FAs include glitch attacks on the power supply and laser attacks on the cards [2,24]. By performing side-channel analyses and FAs in combination, it is possible to break cryptographic algorithms to receive secret data or keys [16].…”
Section: Attacks On Java Cardsmentioning
confidence: 99%
See 1 more Smart Citation
“…Another way [8,9] is to trick the virtual machine to handle an object as an array. Hence, fields from a forged object can be seen as length of the array if they are stored at the same offset in the physical memory.…”
Section: Logical Attackmentioning
confidence: 99%