2012
DOI: 10.1007/978-3-642-34135-9_19
|View full text |Cite
|
Sign up to set email alerts
|

A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks

Abstract: International audienceOff late security problems related to smart cards have seen a significant rise and the risks of the attack are of deep concern for the industries. In this context, smart card industries try to overcome the anomaly by implementing various countermeasures. In this paper we discuss and present a powerful attack based on the vulnerability of the linker which could change the correct byte code into malicious one. During the attack, the linker interprets the instructions as tokens and are able … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 6 publications
0
10
0
Order By: Relevance
“…In [18], a more memory-friendly countermeasure is presented, called field of bit; this countermeasure verifies whether a FA leads the JVM to illegally interpret bytecode operands as opcodes. An off-card encryption of the method bytecode is proposed in [17]. This bytecode encryption counteracts the security threat of jumping out of the actual method code and executing undefined data.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [18], a more memory-friendly countermeasure is presented, called field of bit; this countermeasure verifies whether a FA leads the JVM to illegally interpret bytecode operands as opcodes. An off-card encryption of the method bytecode is proposed in [17]. This bytecode encryption counteracts the security threat of jumping out of the actual method code and executing undefined data.…”
Section: Related Workmentioning
confidence: 99%
“…The countermeasure needs no off-card pre-processing of a Java applet, as required by other countermeasures [18,5,19,17,7,11,13]. Furthermore, the countermeasure consumes no additional run-time memory for storing the Java type information during run-time as in [11].…”
Section: Industrial Usabilitymentioning
confidence: 99%
“…In [20], the authors propose storing a countermeasure flag in a new applet component to indicate whether the method is encrypted. They perform this encryption using a secret key and the Java program counter for the bytecode of every method.…”
Section: Countermeasures Against Java Card Attacksmentioning
confidence: 99%
“…To be able to execute Java applets, the VM uses internal data structures, such as the OS or the LV, to store interim results of logical and combinatorial operations. All of these internal data structures are general objects for adversaries that attack the Java Card [4,20,24]. For every method invocation performed by the VM, a new Java frame [19] is created.…”
Section: Java Card Virtual Machinementioning
confidence: 99%
See 1 more Smart Citation