International audienceRetrieving assets inside a secure element is a challenging task. The most attractive assets are the cryptographic keys stored into the non volatile memory (NVM) area. Most of the researches try to obtain them through side channel attacks or fault attacks. Such cryptographic objects are stored into secure containers. We demonstrate in this paper how one can use some characteristics of the Java Card platform to gain access to these assets. Such a smart card embeds a firewall that provides isolation between applets from different clients (using the notion of security contexts). We exploit the client/server architecture of the intra platform communication to lure a client application to execute within its security context,...
Smart cards play a key role in various applications we use on a daily basis: payment, mobile communi...
There is a growing interest for using "intelligent" or "smart" cards such as Sun...
International audienceAttacks on smart cards can only be based on a black box approach where the cod...
International audienceRetrieving assets inside a secure element is a challenging task. The most attr...
International audienceSecure elements store and manipulate assets in a secure way. The most attracti...
International audienceVarious attacks are designed to gain access to the assets of JavaCard Platform...
Part 7: Java Card SecurityInternational audienceThe Java Card uses two components to ensure the secu...
When it comes to security, an interesting difference between Java Card and regular Java is the absen...
International audienceSmart card is the safest device to execute crypto- graphic algorithms. Recent ...
International audienceOff late security problems related to smart cards have seen a significant rise...
Java Card is a kind of smart card that implements one of the two editions, "Classic Edition" or "Con...
Part 1: Smart Cards System SecurityInternational audienceThe ability of Java Cards to withstand atta...
Part 4: Smart Cards Security (Short Papers)International audienceSmart cards are the safer device to...
Till recently it was only possible to have one single application running on a smart card. Multi-app...
Smart cards play a key role in various applications we use on a daily basis: payment, mobile communi...
Smart cards play a key role in various applications we use on a daily basis: payment, mobile communi...
There is a growing interest for using "intelligent" or "smart" cards such as Sun...
International audienceAttacks on smart cards can only be based on a black box approach where the cod...
International audienceRetrieving assets inside a secure element is a challenging task. The most attr...
International audienceSecure elements store and manipulate assets in a secure way. The most attracti...
International audienceVarious attacks are designed to gain access to the assets of JavaCard Platform...
Part 7: Java Card SecurityInternational audienceThe Java Card uses two components to ensure the secu...
When it comes to security, an interesting difference between Java Card and regular Java is the absen...
International audienceSmart card is the safest device to execute crypto- graphic algorithms. Recent ...
International audienceOff late security problems related to smart cards have seen a significant rise...
Java Card is a kind of smart card that implements one of the two editions, "Classic Edition" or "Con...
Part 1: Smart Cards System SecurityInternational audienceThe ability of Java Cards to withstand atta...
Part 4: Smart Cards Security (Short Papers)International audienceSmart cards are the safer device to...
Till recently it was only possible to have one single application running on a smart card. Multi-app...
Smart cards play a key role in various applications we use on a daily basis: payment, mobile communi...
Smart cards play a key role in various applications we use on a daily basis: payment, mobile communi...
There is a growing interest for using "intelligent" or "smart" cards such as Sun...
International audienceAttacks on smart cards can only be based on a black box approach where the cod...