International audienceA fuzzing attack enables an attacker to gain access to restricted resources by exploiting a wrong specification implementation. Fuzzing attack consists in sending commands with parameters out of their specification range. This study aims at protecting Java Card applets against such attacks. To do this, we detect prior to deployment an unexpected behavior of the application without any knowledge of its specification. Our approach is not based on a fuzzing technique. It relies on a static analysis method and uses an unsupervised machine-learning algorithm on source codes. For this purpose, we have designed a front end tool fetchVuln that helps the developer to detect wrong implementations. It relies on a back end tool Ch...
International audienceRecently, researchers published several attacks on smart cards. Among these, s...
Smart cards are the keystone of various applications which we daily use: pay money for travel, phone...
Smart cards are the keystone of various applications which we daily use: pay money for travel, phone...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
De nos jours, les cartes à puces sont utilisées quotidiennement. Elles nous permettent par exemple d...
International audienceThis study focuses on automatically detecting wrong implementations of specifi...
Fuzzing is a popular security testing technique consisting in generating massive amount of random in...
Fuzzing is a popular security testing technique consisting in generating massive amount of random in...
Fuzzing is a popular security testing technique consisting in generating massive amount of random in...
Part 7: Java Card SecurityInternational audienceThe Java Card uses two components to ensure the secu...
Part 1: Smart Cards System SecurityInternational audienceThe ability of Java Cards to withstand atta...
International audienceSecurity issues can be leveraged when input parameters are not checked. These ...
International audienceRecently, researchers published several attacks on smart cards. Among these, s...
International audienceRecently, researchers published several attacks on smart cards. Among these, s...
Smart cards are the keystone of various applications which we daily use: pay money for travel, phone...
Smart cards are the keystone of various applications which we daily use: pay money for travel, phone...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
De nos jours, les cartes à puces sont utilisées quotidiennement. Elles nous permettent par exemple d...
International audienceThis study focuses on automatically detecting wrong implementations of specifi...
Fuzzing is a popular security testing technique consisting in generating massive amount of random in...
Fuzzing is a popular security testing technique consisting in generating massive amount of random in...
Fuzzing is a popular security testing technique consisting in generating massive amount of random in...
Part 7: Java Card SecurityInternational audienceThe Java Card uses two components to ensure the secu...
Part 1: Smart Cards System SecurityInternational audienceThe ability of Java Cards to withstand atta...
International audienceSecurity issues can be leveraged when input parameters are not checked. These ...
International audienceRecently, researchers published several attacks on smart cards. Among these, s...
International audienceRecently, researchers published several attacks on smart cards. Among these, s...
Smart cards are the keystone of various applications which we daily use: pay money for travel, phone...
Smart cards are the keystone of various applications which we daily use: pay money for travel, phone...