Skip to Main content Skip to Navigation

Subverting Byte Code Linker service to characterize Java Card API

Abstract : Smart card is the safest device to execute crypto- graphic algorithms. Recent cards have the ability to download programs after issuance. These applications are verified before being loaded in the card. Recently, the idea of combining logical attacks with a physical attack in order to bypass byte code verification has emerged. For instance, correct and legitimate Java Card applications can be dynamically modified inside the card using a laser beam. Such applications become mutant applications. We propose here to go a step further in designing explicit viruses for smart cards. In order to generate efficient viruses we need to retrieve information concerning the linking process in the card. We have developed and experimented on most of the Java Card publicly available this generic attack. We present an example of virus using the result of this attack
Document type :
Conference papers
Complete list of metadatas
Contributor : Yolande Vieceli <>
Submitted on : Tuesday, January 28, 2014 - 11:20:31 AM
Last modification on : Thursday, January 11, 2018 - 6:26:29 AM


  • HAL Id : hal-00937333, version 1



Samiya Hamadouche, Guillaume Bouffard, Jean-Louis Lanet, Bruno Dorsemaine, Bastien Nouhant, et al.. Subverting Byte Code Linker service to characterize Java Card API. 7ème Conférence sur la Sécurité des Architectures Réseaux et Systèmes d'Information, May 2012, Cabourg, France. pp.75-81. ⟨hal-00937333⟩



Record views