2011
DOI: 10.1007/978-3-642-27257-8_2
|View full text |Cite
|
Sign up to set email alerts
|

Synchronized Attacks on Multithreaded Systems - Application to Java Card 3.0 -

Abstract: Up to now devices in charge of performing secure transactions mainly remained limited regarding their functionalities. However the trend has recently gone towards an increasing integration of features and technologies, which could potentially represent a source of additional threats. This article introduces an innovative attack exploiting advanced functionalities and offering unrivalled opportunities. This attack targets specifically the multithreaded systems featuring network capabilities. By the way of a net… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…In both cases we can use the result presented in [21], exploiting I/O flooding to force a thread scheduling at a specific time. As a consequence, the attacker finds herself in the situation described in Section 2.1 where she can access the APDU buffer almost whenever she pleases.…”
Section: Attacking Through the Eavesdropping Restartable Taskmentioning
confidence: 99%
“…In both cases we can use the result presented in [21], exploiting I/O flooding to force a thread scheduling at a specific time. As a consequence, the attacker finds herself in the situation described in Section 2.1 where she can access the APDU buffer almost whenever she pleases.…”
Section: Attacking Through the Eavesdropping Restartable Taskmentioning
confidence: 99%
“…} temporary data. In both cases we can use the result presented in [21], exploiting I/O flooding to force a thread scheduling at a specific time. As a consequence, the attacker finds herself in the situation described in Section 2.1 where she can access the APDU buffer almost whenever she pleases.…”
Section: Attacking Through the Eavesdropping Restartable Taskmentioning
confidence: 99%
“…The fault injection aims at disrupting mechanism enforcing these rules and the malicious application exploits the provoked breach. Since then, many Combined Attacks have been published to attack several vital points of a Java Card such as the APDU buffer, the application firewall or the operand stack for instance (Vétillard and Ferrari, 2010;Barbu et al, 2010;Barbu and Thiebeauld, 2011;Barbu et al, 2012b;Barbu et al, 2012a).…”
Section: Fault Attacks On Smart Cardsmentioning
confidence: 99%