Treffer: Java Card Operand Stack : Fault Attacks, Combined Attacks and Countermeasures

Title:
Java Card Operand Stack : Fault Attacks, Combined Attacks and Countermeasures
Contributors:
Laboratoire Traitement et Communication de l'Information (LTCI), Télécom ParisTech-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS), Oberthur Technologies, Emmanuel Prouff, TC 8, TC 11, WG 8.8, WG 11.2
Source:
10th Smart Card Research and Advanced Applications (CARDIS). :297-313
Publisher Information:
HAL CCSD; Springer, 2011.
Publication Year:
2011
Collection:
collection:INSTITUT-TELECOM
collection:CNRS
collection:ENST
collection:TELECOM-PARISTECH
collection:PARISTECH
collection:IFIP-LNCS
collection:IFIP
collection:IFIP-TC
collection:IFIP-WG
collection:IFIP-TC11
collection:IFIP-TC8
collection:IFIP-WG11-2
collection:IFIP-CARDIS
collection:IFIP-WG8-8
collection:IFIP-LNCS-7079
collection:LTCI
collection:COMELEC
collection:SSH
collection:INSTITUTS-TELECOM
collection:INSTITUT-MINES-TELECOM
Subject Geographic:
Original Identifier:
HAL: hal-00692171
Document Type:
Konferenz conferenceObject<br />Conference papers
Language:
English
Relation:
info:eu-repo/semantics/altIdentifier/doi/10.1007/978-3-642-27257-8_19
DOI:
10.1007/978-3-642-27257-8_19
Rights:
info:eu-repo/semantics/OpenAccess
URL: http://creativecommons.org/licenses/by/
Accession Number:
edshal.hal.00692171v1
Database:
HAL

Weitere Informationen

Part 7: Java Card Security
Until 2009, Java Cards have been mainly threatened by Logical Attacks based on ill-formed applications. The publication of the Java Card 3.0 Connected Edition specifications and their mandatory on-card byte code verification may have then lead to the end of software-based attacks against such platforms. However, the introduction in the Java Card field of Fault Attacks, well-known from the cryptologist community, has proven this conclusion wrong. Actually, the idea of combining Fault Attacks and Logical Attacks to tamper with Java Cards appears as an even more dangerous threat. Although the operand stack is a fundamental element of all Java Card Virtual Machines, the potential consequences of a physical perturbation of this element has never been studied so far. In this article, we explore this path by presenting both Fault Attacks and Combined Attacks taking advantage of an alteration of the operand stack. In addition, we provide experimental results proving the practical feasibility of these attacks and illustrating their efficiency. Finally, we describe different approaches to protect the operand stack's integrity and compare their cost with a particular interest on the time factor.