Detecting trapdoors in smart cards using timing and power analysis

3Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

For economic reasons, in spite of security problems, the commands of re-initializing the card and writing patch code are widely used in smart cards. The current software tester has difficulty in detecting these trapdoor commands by reason that trapdoors are not published and programmed sophisticatedly. Up to now the effective way to detect them is to completely reveal and analyze the entire code of the COS with applications such as the ITSEC. It is, however, very time-consuming and expensive processes. We propose a new approach of detecting trapdoors in smart cards using timing and power analysis. By experiments, this paper shows that this approach is a more practical method than the current methods. © IFIP 2005.

Cite

CITATION STYLE

APA

Lee, J. Y., Jung, S. W., & Lim, J. (2005). Detecting trapdoors in smart cards using timing and power analysis. In Lecture Notes in Computer Science (Vol. 3502, pp. 275–288). Springer Verlag. https://doi.org/10.1007/11430230_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free