International audienceA fuzzing attack enables an attacker to gain access to restricted resources by exploiting a wrong specification implementation. Fuzzing attack consists in sending commands with parameters out of their specification range. This study aims at protecting Java Card applets against such attacks. To do this, we detect prior to deployment an unexpected behavior of the application without any knowledge of its specification. Our approach is not based on a fuzzing technique. It relies on a static analysis method and uses an unsupervised machine-learning algorithm on source codes. For this purpose, we have designed a front end tool fetchVuln that helps the developer to detect wrong implementations. It relies on a back end tool Ch...
Smart cards are the keystone of various applications which we daily use: pay money for travel, phone...
Smart cards are the keystone of various applications which we daily use: pay money for travel, phone...
When it comes to security, an interesting difference between Java Card and regular Java is the absen...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
De nos jours, les cartes à puces sont utilisées quotidiennement. Elles nous permettent par exemple d...
Abstract. The Java Card API provides a framework of classes and interfaces that hides the details of...
The Java Card API provides a framework of classes and interfaces that hides the details of the under...
Abstract. The Java Card API provides a framework of classes and interfaces that hides the details of...
Abstract. The Java Card API provides a framework of classes and interfaces that hides the details of...
Malicious Java applets are widely used to deliver malicious software to remote systems. In this work...
International audienceFault attack represents one of the serious threat against Java Card security. ...
Smart cards are the keystone of various applications which we daily use: pay money for travel, phone...
International audienceThis study focuses on automatically detecting wrong implementations of specifi...
Smart cards are the keystone of various applications which we daily use: pay money for travel, phone...
Smart cards are the keystone of various applications which we daily use: pay money for travel, phone...
When it comes to security, an interesting difference between Java Card and regular Java is the absen...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
De nos jours, les cartes à puces sont utilisées quotidiennement. Elles nous permettent par exemple d...
Abstract. The Java Card API provides a framework of classes and interfaces that hides the details of...
The Java Card API provides a framework of classes and interfaces that hides the details of the under...
Abstract. The Java Card API provides a framework of classes and interfaces that hides the details of...
Abstract. The Java Card API provides a framework of classes and interfaces that hides the details of...
Malicious Java applets are widely used to deliver malicious software to remote systems. In this work...
International audienceFault attack represents one of the serious threat against Java Card security. ...
Smart cards are the keystone of various applications which we daily use: pay money for travel, phone...
International audienceThis study focuses on automatically detecting wrong implementations of specifi...
Smart cards are the keystone of various applications which we daily use: pay money for travel, phone...
Smart cards are the keystone of various applications which we daily use: pay money for travel, phone...
When it comes to security, an interesting difference between Java Card and regular Java is the absen...