Attack model for verification of interval security properties for smart card C codes - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2010

Attack model for verification of interval security properties for smart card C codes

Résumé

Smart card programs are subject to physical attacks that disturb the execution of the embedded code. These attacks enable attackers to steal valuable information or to force a malicious behavior upon the attacked code. This paper proposes a methodology to check interval security properties on smart card source codes. The goal is to identify critical attacks that violate these security properties. The verification takes place at source-level and considers all possible attacks thanks to a proposed source-level model of physical attacks. The paper defines an equivalence relation between attacks and shows that a code can be divided into areas where attacks are equivalent. Thus, verifying an interval security property considering all the possible attacks requires to verify as many codes as the number of equivalence classes. This paper provides a reduction algorithm to define the classes i.e. the minimal number of attacked codes that covers all possible attacks. The paper also proposes a solution to make the property verification possible for large codes or codes having unknown source parts.
Fichier non déposé

Dates et versions

hal-00476478 , version 1 (26-04-2010)

Identifiants

Citer

Pascal Berthomé, Karine Heydemann, Xavier Kauffmann-Tourkestansky, Jean-François Lalande. Attack model for verification of interval security properties for smart card C codes. PLAS '10 - 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, Jun 2010, Toronto, Canada. pp.2:1--2:12, ⟨10.1145/1814217.1814219⟩. ⟨hal-00476478⟩
195 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More