Zobrazeno 1 - 10
of 35
pro vyhledávání: '"logical attack"'
Publikováno v:
网络与信息安全学报, Vol 3, Pp 58-64 (2017)
To protect privacy and the safety of property,the security research of Java card was proposed.On the basis of systematically discussing the basic composition of Java card,the key of attacking methods were summarized,including logical attack,fault inj
Externí odkaz:
https://doaj.org/article/8666e7e72dbf4c019921f1d014079748
Publikováno v:
Sensors, Vol 20, Iss 18, p 5410 (2020)
Digital fingerprints are being used more and more to secure applications for logical and physical access control. In order to guarantee security and privacy trends, a biometric system is often implemented on a secure element to store the biometric re
Externí odkaz:
https://doaj.org/article/f0a3225c66a94fc591f2b5132daf87f0
Autor:
Kathem, Aya
Network systems often contain vulnerabilities that remain unmitigated in a network for various reasons, such as lack of a patch and limited budget. Adversaries can exploit these existing vulnerabilities through different strategies. The attackers can
Externí odkaz:
http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-103564
Autor:
Guillaume Bouffard, Jean-Louis Lanet
Publikováno v:
Computers and Security
Computers and Security, Elsevier, 2015, 50, pp.33-46. ⟨10.1016/j.cose.2015.01.004⟩
Computers and Security, 2015, 50, pp.33-46. ⟨10.1016/j.cose.2015.01.004⟩
Computers and Security, Elsevier, 2015, 50, pp.33-46. ⟨10.1016/j.cose.2015.01.004⟩
Computers and Security, 2015, 50, pp.33-46. ⟨10.1016/j.cose.2015.01.004⟩
International audience; Recently, researchers published several attacks on smart cards. Among these, software attacks are the most affordable, they do not require specific hardware (laser, EM probe, etc.). Such attacks succeed to modify a sensitive s
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
15th Smart Card Research and Advanced Application Conference
15th Smart Card Research and Advanced Application Conference, Aurélien Francillon, Nov 2016, Cannes, France
15th Smart Card Research and Advanced Application Conference, Aurélien Francillon, Nov 2016, Cannes, France
International audience; We present in this paper a new approach to gain access toassets of a smart card. It is based on the concept of reference forgeryand array extension. We characterize the meta data of the system usingdifferent level of expertize
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::36c53ce14e2b129d2e26c7551eb65059
https://hal.inria.fr/hal-01385202
https://hal.inria.fr/hal-01385202
Publikováno v:
15th International Conference of the Biometrics Special Interest Group (BIOSIG)
15th International Conference of the Biometrics Special Interest Group (BIOSIG), Sep 2016, Darmstadt, Germany
BIOSIG
15th International Conference of the Biometrics Special Interest Group (BIOSIG), Sep 2016, Darmstadt, Germany
BIOSIG
International audience; The fingerprint biometric data is a very sensitive information because we have no possibility to revoke it. In this study, we want to determine if an attacker with different a priori information on the sensor parameters during
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::baa82cb158c709b78c20fa74a618e901
https://hal.archives-ouvertes.fr/hal-01375852
https://hal.archives-ouvertes.fr/hal-01375852
Publikováno v:
Recent Trends in Computer Networks and Distributed Systems Security
International Conference, SNDS 2012
International Conference, SNDS 2012, Oct 2012, Trivandrum, India. pp.185-194, ⟨10.1007/978-3-642-34135-9_19⟩
Communications in Computer and Information Science ISBN: 9783642341342
SNDS
International Conference, SNDS 2012
International Conference, SNDS 2012, Oct 2012, Trivandrum, India. pp.185-194, ⟨10.1007/978-3-642-34135-9_19⟩
Communications in Computer and Information Science ISBN: 9783642341342
SNDS
International audience; Off late security problems related to smart cards have seen a significant rise and the risks of the attack are of deep concern for the industries. In this context, smart card industries try to overcome the anomaly by implement
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::429288d3b1b664b3ef96d4c364d5d478
https://hal.archives-ouvertes.fr/hal-00937272
https://hal.archives-ouvertes.fr/hal-00937272
Autor:
Jean-Louis Lanet
Publikováno v:
Risk and Security of Internet and Systems (CRiSIS), 2012
7th International Conference on Risk and Security of Internet and Systems (CRiSIS), 2012
7th International Conference on Risk and Security of Internet and Systems (CRiSIS), 2012, Oct 2012, Cork, Ireland. pp.1-5, ⟨10.1109/CRISIS.2012.6378959⟩
CRiSIS
7th International Conference on Risk and Security of Internet and Systems (CRiSIS), 2012
7th International Conference on Risk and Security of Internet and Systems (CRiSIS), 2012, Oct 2012, Cork, Ireland. pp.1-5, ⟨10.1109/CRISIS.2012.6378959⟩
CRiSIS
International audience; Smart card are often the target of software or hardware attacks. Recently several logical attacks have been developed that allows to dump the EEPROM memory. This kind of attack are particularly affordable for students who can
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e50d530b57d06f3148d1b391b356fe9d
https://hal.archives-ouvertes.fr/hal-00937353
https://hal.archives-ouvertes.fr/hal-00937353
Publikováno v:
IFIP Advances in Information and Communication Technology
27th Information Security and Privacy Conference (SEC)
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.37-48, ⟨10.1007/978-3-642-30436-1_4⟩
IFIP Advances in Information and Communication Technology ISBN: 9783642304354
SEC
27th Information Security and Privacy Conference (SEC)
27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Greece. pp.37-48, ⟨10.1007/978-3-642-30436-1_4⟩
IFIP Advances in Information and Communication Technology ISBN: 9783642304354
SEC
Part 1: Attacks and Malicious Code; International audience; In this article we present the first Combined Attack on a Java Card targeting the APDU buffer itself, thus threatening both the security of the platform and of the hosted applications as wel
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f430f27129f779685c8b7514ccb5899f
https://hal.archives-ouvertes.fr/hal-00706186/file/main.pdf
https://hal.archives-ouvertes.fr/hal-00706186/file/main.pdf