An Efficient and Simple Way to Test the Security of Java CardsTM

نویسندگان

  • Serge Chaumette
  • Damien Sauveron
چکیده

Till recently it was impossible to have more than one single application running on a smart card. Multiapplication cards, and especially Java Cards, now make it possible to have several applications sharing the same physical piece of plastic. Today, these cards accept to load code only after an authentication. But in the future, the cards will be open an everybody should be authorized to upload an application. This raises new security problems by creating additional ways to attack Java Cards. These problems and the method to test them are the topic of this paper. The attacks will be illustrated with code samples. The method presented here can be applied right now by authorised people (e.g. Information Technology Evaluation Facility – ITSEF) to test the security of Java Cards since they have the authentication keys and tomorrow a hacker may also be able to use this method to attack cards without needing the keys.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Analysis of the Local Resources Potential to Achieve Food Security in Jombang and Probolinggo Regencies East Java Indonesia

This study aims at analyzing the characteristics of the food need in the area of Jombang and Probolinggo regencies as well as developing a model of local superiority-based policy to achieve the food security. This study employs descriptive qualitative approach. This study is carried out in eight months in March to October 2015. The respondent of the study is the governmental staff of Jombang an...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

A Simple, Artistic and Efficient Modification of the Inversion Method

     The simplest and fastest way of producing an acceptable and accurate cast is by adopting the two-pour or inversion method. This process is slightly cumbersome and messy due to difficulty of access. A much more efficient, easy and artistic way of accomplishing it is described by adopting a Rotating Cake Icing Table with a Silicone Baking Mat on top as an autoclavable non-stick barrier.    

متن کامل

Testing Weak-Form Efficient Capital Market Case Study: TSE and DJUS Indices

The present study investigated weak-form market information efficiency in Tehran security exchange (TSE) as an emerging market and in Dow Jones United States security exchange (DJUS) as a developed market based on random walk model. In each market, the random walk model was examined using daily and monthly returns of a set of indices. The results of the parametric and non-parametric tests indic...

متن کامل

Secure FPGA Design by Filling Unused Spaces

Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005