Part 4: Smart Cards Security (Short Papers)International audienceSmart cards are the safer device to execute cryptographic algorithms. Applications are verified before being loaded into the card. Recently, the idea of combined attacks to bypass byte code verification has emerged. Indeed, correct and legitimate Java Card applications can be dynamically modified on-card using a laser beam to become mutant applications or fault enabled viruses. We propose a framework for manipulating binary applications to design viruses for smart cards. We present development, experimentation and an example of this kind of virus
There is a growing interest for using "intelligent" or "smart" cards such as Sun...
International audienceIn smart card domain, attacks and countermeasures are advancing at a fast rate...
Abstract. Java Cards have been threatened so far by attacks using ill-formed applications which assu...
Part 4: Smart Cards Security (Short Papers)International audienceSmart cards are the safer device to...
Part 4: Smart Cards Security (Short Papers)International audienceSmart cards are the safer device to...
International audienceSmart card is the safest device to execute crypto- graphic algorithms. Recent ...
Java Card is a kind of smart card that implements one of the two editions, "Classic Edition" or "Con...
Java Card is a kind of smart card that implements one of the two editions, "Classic Edition" or "Con...
Part 1: Smart Cards System SecurityInternational audienceThe ability of Java Cards to withstand atta...
International audienceSmart card are often the target of software or hardware attacks. For instance ...
International audienceSmart card are often the target of software or hardware attacks. For instance ...
When it comes to security, an interesting difference between Java Card and regular Java is the absen...
Part 1: Smart Cards System SecurityInternational audienceThe ability of Java Cards to withstand atta...
International audienceOne of the challenges for smart card deployment is the security interoperabili...
International audienceOff late security problems related to smart cards have seen a significant rise...
There is a growing interest for using "intelligent" or "smart" cards such as Sun...
International audienceIn smart card domain, attacks and countermeasures are advancing at a fast rate...
Abstract. Java Cards have been threatened so far by attacks using ill-formed applications which assu...
Part 4: Smart Cards Security (Short Papers)International audienceSmart cards are the safer device to...
Part 4: Smart Cards Security (Short Papers)International audienceSmart cards are the safer device to...
International audienceSmart card is the safest device to execute crypto- graphic algorithms. Recent ...
Java Card is a kind of smart card that implements one of the two editions, "Classic Edition" or "Con...
Java Card is a kind of smart card that implements one of the two editions, "Classic Edition" or "Con...
Part 1: Smart Cards System SecurityInternational audienceThe ability of Java Cards to withstand atta...
International audienceSmart card are often the target of software or hardware attacks. For instance ...
International audienceSmart card are often the target of software or hardware attacks. For instance ...
When it comes to security, an interesting difference between Java Card and regular Java is the absen...
Part 1: Smart Cards System SecurityInternational audienceThe ability of Java Cards to withstand atta...
International audienceOne of the challenges for smart card deployment is the security interoperabili...
International audienceOff late security problems related to smart cards have seen a significant rise...
There is a growing interest for using "intelligent" or "smart" cards such as Sun...
International audienceIn smart card domain, attacks and countermeasures are advancing at a fast rate...
Abstract. Java Cards have been threatened so far by attacks using ill-formed applications which assu...