International audienceFault attack represents one of the serious threat against Java Card security. It consists in physical perturbation of chip components that cause an unusual behavior in the execution of Java Card applications. This perturbation allows to introduce faults on Java Card appli- cation, with the aim to reveal a secret information that are stored in the card or grant an undesired authorization. This paper presents a method- ology to recognize the sensitive code to the fault attack in the Java Card applications. It is based on concept from textcategorization and machine learning
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
Abstract. The Java Card API provides a framework of classes and interfaces that hides the details of...
Abstract. The Java Card API provides a framework of classes and interfaces that hides the details of...
When it comes to security, an interesting difference between Java Card and regular Java is the absen...
International audienceSmart card are often the target of software or hardware attacks. For instance ...
International audienceSmart card are often the target of software or hardware attacks. For instance ...
International audienceIn smart card domain, attacks and countermeasures are advancing at a fast rate...
International audienceIn smart card domain, attacks and countermeasures are advancing at a fast rate...
International audienceVarious attacks are designed to gain access to the assets of JavaCard Platform...
International audienceVarious attacks are designed to gain access to the assets of JavaCard Platform...
International audienceVarious attacks are designed to gain access to the assets of JavaCard Platform...
International audienceVarious attacks are designed to gain access to the assets of JavaCard Platform...
International audienceOne of the challenges for smart card deployment is the security interoperabili...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
Abstract. The Java Card API provides a framework of classes and interfaces that hides the details of...
Abstract. The Java Card API provides a framework of classes and interfaces that hides the details of...
When it comes to security, an interesting difference between Java Card and regular Java is the absen...
International audienceSmart card are often the target of software or hardware attacks. For instance ...
International audienceSmart card are often the target of software or hardware attacks. For instance ...
International audienceIn smart card domain, attacks and countermeasures are advancing at a fast rate...
International audienceIn smart card domain, attacks and countermeasures are advancing at a fast rate...
International audienceVarious attacks are designed to gain access to the assets of JavaCard Platform...
International audienceVarious attacks are designed to gain access to the assets of JavaCard Platform...
International audienceVarious attacks are designed to gain access to the assets of JavaCard Platform...
International audienceVarious attacks are designed to gain access to the assets of JavaCard Platform...
International audienceOne of the challenges for smart card deployment is the security interoperabili...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
Abstract. The Java Card API provides a framework of classes and interfaces that hides the details of...
Abstract. The Java Card API provides a framework of classes and interfaces that hides the details of...