2010
DOI: 10.1007/978-3-642-12510-2_11
|View full text |Cite
|
Sign up to set email alerts
|

Attacks on Java Card 3.0 Combining Fault and Logical Attacks

Abstract: Abstract. Java Cards have been threatened so far by attacks using ill-formed applications which assume that the application bytecode is not verified. This assumption remained realistic as long as the bytecode verifier was commonly executed off-card and could thus be bypassed. Nevertheless it can no longer be applied to the Java Card 3 Connected Edition context where the bytecode verification is necessarily performed on-card. Therefore Java Card 3 Connected Edition seems to be immune against this kind of attack… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
43
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 59 publications
(43 citation statements)
references
References 8 publications
0
43
0
Order By: Relevance
“…In 2010, Barbu et al [194] along with Vétillard and Ferrari [198] used a similar attack methodology to Sere et al [216] that later came to be known as combined attacks. Later, the combined attack technique was extended to target various components of JCVM in [217] [220].…”
Section: Smart Card Runtime Environmentmentioning
confidence: 99%
See 2 more Smart Citations
“…In 2010, Barbu et al [194] along with Vétillard and Ferrari [198] used a similar attack methodology to Sere et al [216] that later came to be known as combined attacks. Later, the combined attack technique was extended to target various components of JCVM in [217] [220].…”
Section: Smart Card Runtime Environmentmentioning
confidence: 99%
“…In the ICOM, such issues have limited impact because of the strict controls on application installation [190,194,195]. This means that compatibility, security, and reliability of an application with respect to an SCRT are evaluated before installing it.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This inspection may be performed by using any kind of imaging techniques or by using destructive means such as abrasion, chemical etching or focused ion beam. Combinaison of those three techniques have also been proposed [7,36].…”
Section: Introductionmentioning
confidence: 99%
“…Their goal is to alter the correct progress of the algorithm and, by analyzing the deviation of the corrupted behavior with respect to the original one, to retrieve the secret information [14]. For java card, fault attacks target particular components of the virtual machine [3,4,9].…”
Section: Introductionmentioning
confidence: 99%