Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2012

Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused

Résumé

Java Card 3.0 specifications have brought many new features in the Java Card world, amongst which a true garbage collection mechanism. In this paper, we show how one could use this specific feature to predict the references that will be assigned to object instances to be created. We also exploit this reference prediction process in a combined attack. This attack stands as a kind of "application replay" attack, taking advantage of an unspecified behavior of the Java Card Runtime Environment (JCRE) on application instance deletion. It reveals quite powerful, since it potentially permits the attacker to circumvent the application firewall: a fundamental and historical Java Card security mechanism. Finally, we point out that this breach comes from the latest specification update and more precisely from the introduction of the automatic garbage collection mechanism, which leads to a straightforward countermeasure to the exposed attack.
Fichier principal
Vignette du fichier
refprediction.pdf (276.6 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-00692173 , version 1 (28-04-2012)

Identifiants

Citer

Guillaume Barbu, Philippe Hoogvorst, Guillaume Duc. Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused. Engineering Secure Software and Systems: 4th International Symposium, ESSoS 2012, Feb 2012, Eindhoven, Netherlands. pp.1-13, ⟨10.1007/978-3-642-28166-2_1⟩. ⟨hal-00692173⟩
158 Consultations
380 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More