International audienceIn this paper, we propose to use fuzzing techniques to discover vulnerabilities in programs hosted into smart cards used for telecommunications or banking purposes (SIM cards, credit cards, secure element into NFC mobile devices. . . ). Those programs - called applets - usually host sensitive applications and manipulate sensitive data. A flaw by design or by implementation in one of those applet could have disastrous consequences. The proposed approach uses a genetic algorithm to optimize the vulnerabilities search. We illustrate the benefit of the proposed method on a MasterCard M/Chip applet through experimenta
With the increased convergence of technologies whereby a user can access, store and transmit data ac...
Along this thesis, a popular testing technique to find bugs and vulnerabilities called fuzzing is im...
The automatic identification of security-relevant flaws in binary executables is still a young but p...
International audienceThe electronic payment transaction involves the use of a smart card. A card ap...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
International audienceSmart cards are tamper resistant devices but vulnerabilities are sometimes dis...
International audienceFuzzing (aka Fuzz-Testing) consists of automatically creating and evaluating i...
Part 1: Smart Cards System SecurityInternational audienceThe ability of Java Cards to withstand atta...
International audienceSmart card are often the target of software or hardware attacks. The most rece...
ENGELSK: More and more companies are digitizing their services, this is because their customers dema...
Our computers, phones, and other smart devices are running a vast and ever increasing amount of soft...
Abstract. The number of mobile devices has increased dramatically in the past few years. These smart...
De nos jours, les cartes à puces sont utilisées quotidiennement. Elles nous permettent par exemple d...
Part 4: Smart Cards Security (Short Papers)International audienceSmart cards are the safer device to...
The Internet of Things (IoT) has increased the connectivity of systems and fueled the digitalization...
With the increased convergence of technologies whereby a user can access, store and transmit data ac...
Along this thesis, a popular testing technique to find bugs and vulnerabilities called fuzzing is im...
The automatic identification of security-relevant flaws in binary executables is still a young but p...
International audienceThe electronic payment transaction involves the use of a smart card. A card ap...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
International audienceSmart cards are tamper resistant devices but vulnerabilities are sometimes dis...
International audienceFuzzing (aka Fuzz-Testing) consists of automatically creating and evaluating i...
Part 1: Smart Cards System SecurityInternational audienceThe ability of Java Cards to withstand atta...
International audienceSmart card are often the target of software or hardware attacks. The most rece...
ENGELSK: More and more companies are digitizing their services, this is because their customers dema...
Our computers, phones, and other smart devices are running a vast and ever increasing amount of soft...
Abstract. The number of mobile devices has increased dramatically in the past few years. These smart...
De nos jours, les cartes à puces sont utilisées quotidiennement. Elles nous permettent par exemple d...
Part 4: Smart Cards Security (Short Papers)International audienceSmart cards are the safer device to...
The Internet of Things (IoT) has increased the connectivity of systems and fueled the digitalization...
With the increased convergence of technologies whereby a user can access, store and transmit data ac...
Along this thesis, a popular testing technique to find bugs and vulnerabilities called fuzzing is im...
The automatic identification of security-relevant flaws in binary executables is still a young but p...