A friendly framework for hidding fault enabled virus for Java based smartcard

  • Authors:
  • Tiana Razafindralambo;Guillaume Bouffard;Jean-Louis Lanet

  • Affiliations:
  • Secure Smart Devices (SSD) Team, XLIM/Université de Limoges, Limoges, France;Secure Smart Devices (SSD) Team, XLIM/Université de Limoges, Limoges, France;Secure Smart Devices (SSD) Team, XLIM/Université de Limoges, Limoges, France

  • Venue:
  • DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Smart cards are the safer device to execute cryptographic algorithms. Applications are verified before being loaded into the card. Recently, the idea of combined attacks to bypass byte code verification has emerged. Indeed, correct and legitimate Java Card applications can be dynamically modified on-card using a laser beam to become mutant applications or fault enabled viruses. We propose a framework for manipulating binary applications to design viruses for smart cards. We present development, experimentation and an example of this kind of virus.