Good , Bad and Ugly Design of Java Card Security Master ’ s

نویسنده

  • Sergei Volokitin
چکیده

Java Cards are widely used to provide a way of running Java applets on a smart card. The widespread use of the Java Card platform makes it a target for a security research. Attacks on the Java Card platform is an interesting research topic and a lot of studies of physical, logical and combined attacks were published in the last years. This thesis is focused on the study of logical attacks on the Java Card platform which try to exploit bugs in the implementation of the Java Card specification or try to break the security of the virtual machine by installing malformed applets. Although logical attacks are not as universal and powerful as physical attacks, it does not require expensive equipment and scales quite well. The thesis first presents an extensive overview of the state-of-the-art logical attacks on the Java Card platform, including type confusion techniques, binary incomparable libraries, stack underflow and the transaction mechanism abuse. The attacks were implemented and evaluated using a number of Java Cards. The thesis then presents a number of new attacks targeting secured cryptographic key containers provided by the Java Card API as well as attacks on the implementation of OwnerPIN class. The study revealed that most of the cards do not implement any protection of the keys and PIN counters and just store it as a plaintext. Some cards do protect cryptographic containers, by encrypting it with a card-specific key, but we present an attack that bypasses the countermeasure. Additionally, we study illegal opcodes implemented by some of the Java Card virtual machines. The illegal opcodes first were studied by executing it on the card and observing the produced outputs and then the reverse engineering of the emulator of the card was used to find out the purpose of the illegal opcodes. Finally, a number of countermeasures implemented on the Java Card virtual machines are discussed and new countermeasures against discovered vulnerabilities are proposed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Java Memory Model Examples: Good, Bad and Ugly

We review a number of illustrative example programs for the Java Memory Model (JMM) [6, 3], relating them to the original design goals and giving intuitive explanations (which can be made precise). We consider good, bad and ugly examples. The good examples are allowed behaviours in the JMM, showing possibilities for non sequentially consistent executions and reordering optimisations. The bad ex...

متن کامل

Optimisation of Healthcare Contracts: Tensions Between Standardisation and Innovation; Comment on “Competition in Healthcare: Good, Bad or Ugly?”

An important determinant of health system performance is contracting. Providers often respond to financial incentives, despite the ethical underpinnings of medicine, and payers can craft contracts to influence performance. Yet contracting is highly imperfect in both single-payer and multi-payer health systems. Arguably, in a competitive, multi-payer environment, contractual innovation may occur...

متن کامل

Competition in Healthcare: Good, Bad or Ugly?

The role of competition in healthcare is much debated. Despite a wealth of international experience in relation to competition, evidence is mixed and contested and the debate about the potential role for competition is often polarised. This paper considers briefly some of the reasons for this, focusing on what is meant by “competition in healthcare” and why it is more valuable to think about th...

متن کامل

The Good, the Bad, and the Ugly Face Challenge Problem

The Good, the Bad, & the Ugly Face Challenge Problem was created to encourage the development of algorithms that are robust to recognition across changes that occur in still frontal faces. The Good, the Bad, & the Ugly consists of three partitions. The Good partition contains pairs of images that are considered easy to recognize. The base verification rate (VR) is 0.98 at a false accept rate (F...

متن کامل

Range Extension for Weak PRFs; The Good, the Bad, and the Ugly

We investigate a general class of (black-box) constructions for range extension of weak pseudorandom functions: a construction based on m independent functions F1, . . . , Fm is given by a set of strings over {1, . . . , m}, where for example {〈2〉, 〈1, 2〉} corresponds to the function X 7→ [F2(X), F2(F1(X))]. All efficient constructions for range expansion of weak pseudorandom functions that we ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016