Java Card Virtual Machine Compromising from a Bytecode Verified Applet - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2016

Java Card Virtual Machine Compromising from a Bytecode Verified Applet

Résumé

The Byte Code Verifier (BCV) is one of the most important security element in the Java Card environment. Indeed, embedded applets must be verified prior installation to prevent ill-formed applet loading. In this article, we disclose a flaw in the Oracle BCV which affects the applet linking process and can be exploited on real world Java Card smartcards. We describe our exploitation of this flaw on a Java Card implementation that enables injecting and executing arbitrary native malicious code in the communication buffer from a verified applet. This native execution allows snapshotting the smart card memory with OS rights.
Fichier principal
Vignette du fichier
LanciaB15.pdf (647.72 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

hal-03138832 , version 1 (11-02-2021)

Identifiants

Citer

Julien Lancia, Guillaume Bouffard. Java Card Virtual Machine Compromising from a Bytecode Verified Applet. Smart Card Research and Advanced Applications - 14th International Conference, CARDIS 2015, Nov 2015, Bochum, Germany. pp.75-88, ⟨10.1007/978-3-319-31271-2_5⟩. ⟨hal-03138832⟩
43 Consultations
279 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More