2015
DOI: 10.1007/978-3-319-16763-3_1
|View full text |Cite
|
Sign up to set email alerts
|

Memory Forensics of a Java Card Dump

Abstract: International audienceNowadays several papers have shown the ability to dump the EEPROM area of several Java Cards leading to the disclosure of already loaded applet and data structure of the card. Such a reverse engineering process is costly and prone to errors. Currently there are no tools available to help the process. We propose here an approach to find in the raw data obtained after a dump, the area containing the code and the data. Then, once the code area has been identified, we propose to rebuilt the o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…Their work does not provide an automatic interpretation of the data and it requires contextual information to complete the analysis. Another work related to ours is due to Jean-Louis Lanet et al [14], who investigated the reverse engineering of EEP-ROM in Java Cards. They aim to retrieve the location of the source code and data related to the language(package, class, instance .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Their work does not provide an automatic interpretation of the data and it requires contextual information to complete the analysis. Another work related to ours is due to Jean-Louis Lanet et al [14], who investigated the reverse engineering of EEP-ROM in Java Cards. They aim to retrieve the location of the source code and data related to the language(package, class, instance .…”
Section: Introductionmentioning
confidence: 99%
“…This makes the calculation of the index of coincidence meaningless. To retrieve the data related to the language [14] uses a pattern matching technique applied to the headers (or metadata), which differ for each type of data. Unfortunately, there is neither header nor metadata in our dumps.…”
Section: Introductionmentioning
confidence: 99%