Shape Matching and Object Recognition Using Shape Contexts
IEEE Transactions on Pattern Analysis and Machine Intelligence
Intuitive, Localized Analysis of Shape Variability
IPMI '01 Proceedings of the 17th International Conference on Information Processing in Medical Imaging
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Electromagnetic Analysis: Concrete Results
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Power analysis attacks and countermeasures for cryptographic algorithms
Power analysis attacks and countermeasures for cryptographic algorithms
Security on FPGAs: State-of-the-art implementations and attacks
ACM Transactions on Embedded Computing Systems (TECS)
Power and electromagnetic analysis: improved model, consequences and comparisons
Integration, the VLSI Journal - Special issue: Embedded cryptographic hardware
Automatic code recognition for smart cards using a Kohonen neural network
CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
Distance Learning for Similarity Estimation
IEEE Transactions on Pattern Analysis and Machine Intelligence
An overview of side channel analysis attacks
Proceedings of the 2008 ACM symposium on Information, computer and communications security
A High-Resolution Phase-Based Waveform Matching and Its Application to Side-Channel Attacks
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
2D shape classification and retrieval
IJCAI'05 Proceedings of the 19th international joint conference on Artificial intelligence
Remote timing attacks are practical
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Learning Context-Sensitive Shape Similarity by Graph Transduction
IEEE Transactions on Pattern Analysis and Machine Intelligence
Reverse engineering java card applets using power analysis
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
A new inter-frame collusion attack and a countermeasure
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Reverse engineering of embedded software using syntactic pattern recognition
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Experiments and hardware countermeasures on power analysis attacks
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Distance sets for shape filters and shape recognition
IEEE Transactions on Image Processing
Hi-index | 0.00 |
Abstract: This paper presents an application of pattern recognition techniques in reverse engineering for smart cards. The aim of the study is to design algorithms based on shape classification and to determine instructions executed on a chip as well as processed data sets. Information is extracted from the power consumption in order to recover secret information. Then geometrical features are determined and a syntactic analysis is achieved in order to recover secret algorithms and data. Some examples are given showing how code execution can be reversed on a recent secure component. These examples are essentially focused on instruction recovery but the algorithms also work on data recovery or on a combination of both instruction and data recovery.