For economic reasons, in spite of security problems, the commands of re-initializing the card and writing patch code are widely used in smart cards. The current software tester has difficulty in detecting these trapdoor commands by reason that trapdoors are not published and programmed sophisticatedly. Up to now the effective way to detect them is to completely reveal and analyze the entire code of the COS with applications such as the ITSEC. It is, however, very time-consuming and expensive processes. We propose a new approach of detecting trapdoors in smart cards using timing and power analysis. By experiments, this paper shows that this approach is a more practical method than the current methods. © IFIP 2005.
CITATION STYLE
Lee, J. Y., Jung, S. W., & Lim, J. (2005). Detecting trapdoors in smart cards using timing and power analysis. In Lecture Notes in Computer Science (Vol. 3502, pp. 275–288). Springer Verlag. https://doi.org/10.1007/11430230_19
Mendeley helps you to discover research relevant for your work.