Reverse engineering java card applets using power analysis

  • Authors:
  • Dennis Vermoen;Marc Witteman;Georgi N. Gaydadjiev

  • Affiliations:
  • Computer Engineering, TU Delft, The Netherlands and Riscure BV, The Netherlands;Riscure BV, The Netherlands;Computer Engineering, TU Delft, The Netherlands

  • Venue:
  • WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Power analysis on smart cards is widely used to obtain information about implemented cryptographic algorithms. We propose similar methodology for Java Card applets reverse engineering. Because power analysis alone does not provide enough information, we refine our methodology by involving additional information sources. Issues like distinguishing between bytecodes performing similar tasks and reverse engineering of conditional branches and nested loops are also addressed. The proposed methodology is applied to a commercially available Java Card smart card and the results are reported. We conclude that our augmented power analysis can be successfully used to acquire information about the bytecodes executed on a Java Card smart card.