International audienceSmart card are often the target of software or hardware attacks. The most recent attack is based on fault injection which modifies the behavior of the application. We propose an evaluation of the effect of the propagation and the generation of hostile application inside the card. We designed several countermeasures and models of smart cards. Then we evaluate the ability of these countermeasures to detect the faults, and the latency of the detection. In a second step we evaluate the mutant with respect to security properties in order to focus only on the dangerous mutants
International audienceSecurity and attacks are two sides of the same coin in the smart card industry...
International audienceIn smart card domain, attacks and countermeasures are advancing at a fast rate...
Faults attacks are a serious threat to secure devices, because they are powerful and they can be per...
International audienceSmart card are often the target of software or hardware attacks. The most rece...
International audienceSmartcard implementations are prone to perturbation attacks that consist in ch...
Power and clock glitch attacks on smart cards can help an attacker to discover some internal secret...
Part 4: Smart Cards Security (Short Papers)International audienceSmart cards are the safer device to...
Part 1: Smart Cards System SecurityInternational audienceThe ability of Java Cards to withstand atta...
International audienceAbstract. Security and interoperability issues are increasing in smart card do...
International audienceSmart card are often the target of software or hardware attacks. For instance ...
The software quality relies, among others, on security. In the smartcards domain assumed throughout ...
poster abstractToday’s software engineers are faced with the problem of building secure systems from...
International audienceSmart cards are tamper resistant devices but vulnerabilities are sometimes dis...
Vulnerability detections for smart cards require state of the art methods both to attack and to prot...
Smart cards are embedded systems which are used in an increasing number of secure applications. As t...
International audienceSecurity and attacks are two sides of the same coin in the smart card industry...
International audienceIn smart card domain, attacks and countermeasures are advancing at a fast rate...
Faults attacks are a serious threat to secure devices, because they are powerful and they can be per...
International audienceSmart card are often the target of software or hardware attacks. The most rece...
International audienceSmartcard implementations are prone to perturbation attacks that consist in ch...
Power and clock glitch attacks on smart cards can help an attacker to discover some internal secret...
Part 4: Smart Cards Security (Short Papers)International audienceSmart cards are the safer device to...
Part 1: Smart Cards System SecurityInternational audienceThe ability of Java Cards to withstand atta...
International audienceAbstract. Security and interoperability issues are increasing in smart card do...
International audienceSmart card are often the target of software or hardware attacks. For instance ...
The software quality relies, among others, on security. In the smartcards domain assumed throughout ...
poster abstractToday’s software engineers are faced with the problem of building secure systems from...
International audienceSmart cards are tamper resistant devices but vulnerabilities are sometimes dis...
Vulnerability detections for smart cards require state of the art methods both to attack and to prot...
Smart cards are embedded systems which are used in an increasing number of secure applications. As t...
International audienceSecurity and attacks are two sides of the same coin in the smart card industry...
International audienceIn smart card domain, attacks and countermeasures are advancing at a fast rate...
Faults attacks are a serious threat to secure devices, because they are powerful and they can be per...