Evaluation of the Ability to Transform SIM Applications into Hostile Applications - Smart Card Research and Advanced Applications
Conference Papers Year : 2011

Evaluation of the Ability to Transform SIM Applications into Hostile Applications

Guillaume Bouffard
DMI
Jean-Louis Lanet
  • Function : Author
  • PersonId : 918086
DMI
Jean-Baptiste Machemie
  • Function : Author
  • PersonId : 923195
DMI
Jean-Yves Poichotte
  • Function : Author

Abstract

The ability of Java Cards to withstand attacks is based on software and hardware countermeasures, and on the ability of the Java platform to check the correct behavior of Java code (by using byte code verification). Recently, the idea of combining logical attacks with a physical attack in order to bypass byte code verification has emerged. For instance, correct and legitimate Java Card applications can be dynamically modified on-card using a laser beam. Such applications become mutant applications, with a different control flow from the original expected behaviour. This internal change could lead to bypass controls and protections and thus offer illegal access to secret data and operations inside the chip. This paper presents an evaluation of the application ability to become mutant and a new countermeasure based on the runtime checks of the application control flow to detect the deviant mutations.
Fichier principal
Vignette du fichier
978-3-642-27257-8_1_Chapter (2).pdf (178.29 Ko) Télécharger le fichier
Origin Files produced by the author(s)
Loading...

Dates and versions

hal-00684113 , version 1 (27-09-2017)

Licence

Identifiers

Cite

Guillaume Bouffard, Jean-Louis Lanet, Jean-Baptiste Machemie, Jean-Yves Poichotte, Jean-Philippe Wary. Evaluation of the Ability to Transform SIM Applications into Hostile Applications. 10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.1-17, ⟨10.1007/978-3-642-27257-8_1⟩. ⟨hal-00684113⟩
230 View
134 Download

Altmetric

Share

More