Developing a Trojan applets in a smart card

作者: Julien Iguchi-Cartigny , Jean-Louis Lanet

DOI: 10.1007/S11416-009-0135-3

关键词:

摘要: This paper presents a method to inject mutable Java Card applet into smart card. code can on demand parse the memory in order search for given pattern and eliminate it. One of these key features is bypass security checks or retrieve secret data from other applets. We evaluate countermeasures against this attack we show how some them be circumvented propose combine with others already known.

参考文章(7)
Olli Vertanen, Java Type Confusion and Fault Attacks Lecture Notes in Computer Science. pp. 237- 251 ,(2006) , 10.1007/11889700_21
Konstantin Hyppönen, An Open Mobile Identity Tool: An Architecture for Mobile Identity Management european public key infrastructure workshop. pp. 207- 222 ,(2008) , 10.1007/978-3-540-69485-4_15
Markus Kuhn, Ross Anderson, Tamper resistance: a cautionary note WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2. pp. 1- 1 ,(1996)
Wojciech Mostowski, Erik Poll, Malicious Code on Java Card Smartcards: Attacks and Countermeasures smart card research and advanced application conference. pp. 1- 16 ,(2008) , 10.1007/978-3-540-85893-5_1
Pierre Girard, Jean-Louis Lanet, New security issues raised by open cards Information Security Technical Report. ,vol. 4, pp. 19- 27 ,(1999) , 10.1016/S0167-4048(99)80011-9
H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, C. Whelan, The Sorcerer's Apprentice Guide to Fault Attacks Proceedings of the IEEE. ,vol. 94, pp. 370- 382 ,(2006) , 10.1109/JPROC.2005.862424
Pierre Girard, Jean-Louis Lanet, Report highlights: New security issues raised by open cards Information Security Technical Report. ,vol. 4, pp. 4- 5 ,(1999) , 10.1016/S1363-4127(99)80019-3