Reversing Bytecode of Obfuscated Java Based Smart Card Using Side Chanel Analysis

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Developing Smart Card-Based Applications Using Java Card

In this paper we describe a methodology for developing smart card-based applications which accounts for both internal and external software production: on-card and client programs. This development methodology is based on the application of distributed object-oriented principles to Java Card. We design a model in which a card application is viewed as a remote object accessed through method invo...

متن کامل

An in-card bytecode optimization for objects management in Java-based smart cards

Providing object programming for smart cards comes up against difficulties related to performance. Indeed, object management overheads represent an important source of inefficiency in Java programs (such data structures, heap allocation, garbage collection, etc.). In current Java Cards, object programming is not encouraged since garbage collection of objects is not mandatory. However, in the co...

متن کامل

Bytecode verification on Java smart cards

This article presents a novel approach to the problem of bytecode verification for Java Card applets. By relying on prior off-card bytecode transformations, we simplify the bytecode verifier and reduce its memory requirements to the point where it can be embedded on a smart card, thus increasing significantly the security of post-issuance downloading of applets on Java Cards. This article descr...

متن کامل

Towards Verification of Well-Formed Transactions in Java Card Bytecode

Using transactions in Java Card bytecode programs can be rather tricky and requires special attention from the programmer in order to work around some of the limitations imposed and to avoid introducing serious run-time errors due to inappropriate use of transactions. In this paper we present a novel analysis that combines control and data flow analysis with an analysis that tracks active trans...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Security and Its Applications

سال: 2015

ISSN: 1738-9976,1738-9976

DOI: 10.14257/ijsia.2015.9.11.32