Mitigating Type Confusion on Java Card
Autor: | Guillaume Bouffard, Jean Dubreuil, Bhagyalekshmy N. Thampi, Jean-Louis Lanet |
---|---|
Přispěvatelé: | DMI (XLIM-DMI), XLIM (XLIM), Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS)-Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS) |
Rok vydání: | 2013 |
Předmět: |
021110 strategic
defence & security studies business.industry Computer science Interoperability 0211 other engineering and technologies Byte 02 engineering and technology Fault injection Smart Card Fault (power engineering) Backward compatibility Fault Java Card Countermeasures [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] Software Embedded system Viruses 0202 electrical engineering electronic engineering information engineering Typed Stack [INFO.INFO-ES]Computer Science [cs]/Embedded Systems 020201 artificial intelligence & image processing Smart card business |
Zdroj: | International Journal of Secure Software Engineering International Journal of Secure Software Engineering, 2013, 4 (2), pp.19-39. ⟨10.4018/jsse.2013040102⟩ |
ISSN: | 1947-3044 1947-3036 |
DOI: | 10.4018/jsse.2013040102 |
Popis: | One of the challenges for smart card deployment is the security interoperability. A smart card resistant to an attack on a given platform should be able to guarantee the same behavior on another platform. But the current implementations do not comply with this requirement. In order to improve such standardization the authors propose a framework based on annotations with an external pre-processing to switch the Java Card Virtual Machine (JCVM) into a secure mode by activating a set of countermeasures. An example has been proposed in this paper for implementing a countermeasure against type confusion with a fault attack. Smart cards are often the target of software, hardware or combined attacks. In recent days most of the attacks are based on fault injection which can modify the behavior of applications loaded onto the card, changing them into mutant applications. This countermeasure requires a transformation of the original program byte codes which remain semantically equivalent. It needs a modification of the JCVM which stays backward compatible and a dedicated framework to deploy these applications. Thus, the proposed platform can resist to a fault enabled mutant. |
Databáze: | OpenAIRE |
Externí odkaz: |