Part 7: Java Card SecurityInternational audienceThe Java Card uses two components to ensure the security of its model. On the one hand, the byte code verifier (BCV) checks, during an applet installation, if the Java Card security model is ensured. This mechanism may not be present in the card. On the other hand, the firewall dynamically checks if there is no illegal access. This paper describes two attacks to modify the Java Card control flow and to execute our own malicious byte code. In the first attack, we use a card without embedded security verifier and we show how it is simple to change the return address of a current function. In the second attack, we consider the hypothesis that the card embeds a partial implementation of a BCV. Wit...
International audienceSecure elements store and manipulate assets in a secure way. The most attracti...
International audienceRetrieving assets inside a secure element is a challenging task. The most attr...
There is a growing interest for using "intelligent" or "smart" cards such as Sun...
Part 7: Java Card SecurityInternational audienceThe Java Card uses two components to ensure the secu...
Part 1: Smart Cards System SecurityInternational audienceThe ability of Java Cards to withstand atta...
International audienceSmart card is the safest device to execute crypto- graphic algorithms. Recent ...
Abstract. Java Cards have been threatened so far by attacks using ill-formed applications which assu...
When it comes to security, an interesting difference between Java Card and regular Java is the absen...
International audienceVarious attacks are designed to gain access to the assets of JavaCard Platform...
International audienceRecently, researchers published several attacks on smart cards. Among these, s...
International audienceOff late security problems related to smart cards have seen a significant rise...
Java Card is a kind of smart card that implements one of the two editions, "Classic Edition" or "Con...
Part 4: Smart Cards Security (Short Papers)International audienceSmart cards are the safer device to...
International audienceSecure elements store and manipulate assets in a secure way. The most attracti...
International audienceRetrieving assets inside a secure element is a challenging task. The most attr...
There is a growing interest for using "intelligent" or "smart" cards such as Sun...
Part 7: Java Card SecurityInternational audienceThe Java Card uses two components to ensure the secu...
Part 1: Smart Cards System SecurityInternational audienceThe ability of Java Cards to withstand atta...
International audienceSmart card is the safest device to execute crypto- graphic algorithms. Recent ...
Abstract. Java Cards have been threatened so far by attacks using ill-formed applications which assu...
When it comes to security, an interesting difference between Java Card and regular Java is the absen...
International audienceVarious attacks are designed to gain access to the assets of JavaCard Platform...
International audienceRecently, researchers published several attacks on smart cards. Among these, s...
International audienceOff late security problems related to smart cards have seen a significant rise...
Java Card is a kind of smart card that implements one of the two editions, "Classic Edition" or "Con...
Part 4: Smart Cards Security (Short Papers)International audienceSmart cards are the safer device to...
International audienceSecure elements store and manipulate assets in a secure way. The most attracti...
International audienceRetrieving assets inside a secure element is a challenging task. The most attr...
There is a growing interest for using "intelligent" or "smart" cards such as Sun...