A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2012

A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks

Tiana Razafindralambo
  • Fonction : Auteur
DMI
Guillaume Bouffard
DMI
N. Thampi Bhagyalekshmy
  • Fonction : Auteur
DMI
Jean-Louis Lanet
  • Fonction : Auteur
  • PersonId : 918086
DMI

Résumé

Off late security problems related to smart cards have seen a significant rise and the risks of the attack are of deep concern for the industries. In this context, smart card industries try to overcome the anomaly by implementing various countermeasures. In this paper we discuss and present a powerful attack based on the vulnerability of the linker which could change the correct byte code into malicious one. During the attack, the linker interprets the instructions as tokens and are able to resolve them. Later we propose a countermeasure which scrambles the instructions of the method byte code with the Java Card Program Counter (jpc). Without the knowledge of jpc used to decrypt the byte code, an attacker cannot execute any malicious byte code. By this way we propose security interoperability for different Java Card platforms.
Fichier non déposé

Dates et versions

hal-00937272 , version 1 (28-01-2014)

Identifiants

Citer

Tiana Razafindralambo, Guillaume Bouffard, N. Thampi Bhagyalekshmy, Jean-Louis Lanet. A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks. International Conference, SNDS 2012, Oct 2012, Trivandrum, India. pp.185-194, ⟨10.1007/978-3-642-34135-9_19⟩. ⟨hal-00937272⟩

Collections

UNILIM CNRS XLIM
3099 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More