2015
DOI: 10.1016/j.cose.2015.01.004
|View full text |Cite
|
Sign up to set email alerts
|

The ultimate control flow transfer in a Java based smart card

Abstract: International audienceRecently, researchers published several attacks on smart cards. Among these, software attacks are the most affordable, they do not require specific hardware (laser, EM probe, etc.). Such attacks succeed to modify a sensitive system element which offers access to the smart card assets. To prevent that, smart card manufacturers embed dedicated countermeasures that aim to protect the sensitive system elements. We present a generic approach based on a Control Flow Transfer (CFT) attack to mod… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
2
2
2

Relationship

4
2

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…To run a Java applet on resource-constraint devices, the adopted solution is to translate reference name to token during a step made by the Java Card converter 4 . If the class file to convert implements features that can be used by other applications, a Java Card export file is also generated.…”
Section: Java Card Security Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…To run a Java applet on resource-constraint devices, the adopted solution is to translate reference name to token during a step made by the Java Card converter 4 . If the class file to convert implements features that can be used by other applications, a Java Card export file is also generated.…”
Section: Java Card Security Modelmentioning
confidence: 99%
“…The Java Card platform implementation security has been thoroughly studied against software [1,3,4,5,8,9,10,12,17] attacks. Those attacks are implementation dependent and they are prevented by a BCV.…”
Section: State-of-the-art Java Card Platform Securitymentioning
confidence: 99%
“…Bouffard and Lanet [13] presented a generic approach based on a Control Flow Transfer (CFT) attack to modify the Java Card program counter. The attack is based on a type confusion, it abused the BCV verification, using the couple of instructions jsr/ret.…”
Section: Fault Enabled Logical Attacksmentioning
confidence: 99%
“…Despite all the security features enforced by the Java Card environment, several attack paths [1,2,4,5,6,10,11,13,14,15,19,22] have been found exploitable by the Java Card security community.…”
Section: The Java Card Security Modelmentioning
confidence: 99%