International audienceAttacks on smart cards can only be based on a black box approach where the code of cryptographic primitives and operating system are not accessible. To perform hardware or software attacks, a white box approach providing access to the binary code is more effi- cient. In this paper, we propose a methodology to discover the romized code whose access is protected by the virtual machine. It uses a hooked code in an indirection table. We gained access to real processor, thus allowing us to run a shell code written in 8051 assembler language. As a result, this code has been able to dump completely the ROM of a Java Card operating system. One of the issues is the possibility to reverse the cryptographic algorithm and all the ...
International audienceRetrieving assets inside a secure element is a challenging task. The most attr...
The power analysis of smart cards is powerful side channel attack, originally introduced by Kocher e...
International audienceSmart card are often the target of software or hardware attacks. Recently seve...
International audienceAttacks on smart cards can only be based on a black box approach where the cod...
International audienceSecure elements store and manipulate assets in a secure way. The most attracti...
International audienceSmart card is the safest device to execute crypto- graphic algorithms. Recent ...
International audienceVarious attacks are designed to gain access to the assets of JavaCard Platform...
When it comes to security, an interesting difference between Java Card and regular Java is the absen...
Power analysis of smart cards is commonly used to obtain information about implemented cryptographic...
Part 1: Smart Cards System SecurityInternational audienceThe ability of Java Cards to withstand atta...
Abstract. Poweranalysisonsmartcardsiswidelyusedtoobtaininformation about implemented cryptographic a...
Java Card is a kind of smart card that implements one of the two editions, "Classic Edition" or "Con...
Part 4: Smart Cards Security (Short Papers)International audienceSmart cards are the safer device to...
International audienceRecently, logical attacks have been published that target Java based smart car...
International audienceOff late security problems related to smart cards have seen a significant rise...
International audienceRetrieving assets inside a secure element is a challenging task. The most attr...
The power analysis of smart cards is powerful side channel attack, originally introduced by Kocher e...
International audienceSmart card are often the target of software or hardware attacks. Recently seve...
International audienceAttacks on smart cards can only be based on a black box approach where the cod...
International audienceSecure elements store and manipulate assets in a secure way. The most attracti...
International audienceSmart card is the safest device to execute crypto- graphic algorithms. Recent ...
International audienceVarious attacks are designed to gain access to the assets of JavaCard Platform...
When it comes to security, an interesting difference between Java Card and regular Java is the absen...
Power analysis of smart cards is commonly used to obtain information about implemented cryptographic...
Part 1: Smart Cards System SecurityInternational audienceThe ability of Java Cards to withstand atta...
Abstract. Poweranalysisonsmartcardsiswidelyusedtoobtaininformation about implemented cryptographic a...
Java Card is a kind of smart card that implements one of the two editions, "Classic Edition" or "Con...
Part 4: Smart Cards Security (Short Papers)International audienceSmart cards are the safer device to...
International audienceRecently, logical attacks have been published that target Java based smart car...
International audienceOff late security problems related to smart cards have seen a significant rise...
International audienceRetrieving assets inside a secure element is a challenging task. The most attr...
The power analysis of smart cards is powerful side channel attack, originally introduced by Kocher e...
International audienceSmart card are often the target of software or hardware attacks. Recently seve...