International audienceIn smart card domain, attacks and countermeasures are advancing at a fast rate. In order to have a generic view of all the attacks, we propose to use a Fault Tree Analysis. This method used in safety analysis helps to understand and implement all the desirable and undesirable events existing in this domain. We apply this method to Java Card vulnerability analysis. We define the properties that must be ensured: integrity and confidentiality of smart card data and code. By modeling the conditions, we discovered new attack paths to get access to the smart card contents. Then we introduce a new security api which is proposed to mitigate the undesirable events defined in the tree models
International audienceOff late security problems related to smart cards have seen a significant rise...
Abstract. The Java Card API provides a framework of classes and interfaces that hides the details of...
International audienceSmart card are often the target of software or hardware attacks. For instance ...
International audienceIn smart card domain, attacks and countermeasures are advancing at a fast rate...
Smart cards are the keystone of various applications which we daily use: pay money for travel, phone...
Smart cards are the keystone of various applications which we daily use: pay money for travel, phone...
Smart cards are the keystone of various applications which we daily use: pay money for travel, phone...
Part 4: Smart Cards Security (Short Papers)International audienceSmart cards are the safer device to...
Part 4: Smart Cards Security (Short Papers)International audienceSmart cards are the safer device to...
Part 4: Smart Cards Security (Short Papers)International audienceSmart cards are the safer device to...
International audienceFault attack represents one of the serious threat against Java Card security. ...
International audienceSeveral logical attacks against Java based smart card have been published rece...
International audienceSeveral logical attacks against Java based smart card have been published rece...
International audienceSmart card are often the target of software or hardware attacks. For instance ...
When it comes to security, an interesting difference between Java Card and regular Java is the absen...
International audienceOff late security problems related to smart cards have seen a significant rise...
Abstract. The Java Card API provides a framework of classes and interfaces that hides the details of...
International audienceSmart card are often the target of software or hardware attacks. For instance ...
International audienceIn smart card domain, attacks and countermeasures are advancing at a fast rate...
Smart cards are the keystone of various applications which we daily use: pay money for travel, phone...
Smart cards are the keystone of various applications which we daily use: pay money for travel, phone...
Smart cards are the keystone of various applications which we daily use: pay money for travel, phone...
Part 4: Smart Cards Security (Short Papers)International audienceSmart cards are the safer device to...
Part 4: Smart Cards Security (Short Papers)International audienceSmart cards are the safer device to...
Part 4: Smart Cards Security (Short Papers)International audienceSmart cards are the safer device to...
International audienceFault attack represents one of the serious threat against Java Card security. ...
International audienceSeveral logical attacks against Java based smart card have been published rece...
International audienceSeveral logical attacks against Java based smart card have been published rece...
International audienceSmart card are often the target of software or hardware attacks. For instance ...
When it comes to security, an interesting difference between Java Card and regular Java is the absen...
International audienceOff late security problems related to smart cards have seen a significant rise...
Abstract. The Java Card API provides a framework of classes and interfaces that hides the details of...
International audienceSmart card are often the target of software or hardware attacks. For instance ...