Malicious code on Java Card smartcards: Attacks and countermeasures

47Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

When it comes to security, an interesting difference between Java Card and regular Java is the absence of an on-card bytecode verifier on most Java Cards. In principle this opens up the possibility of malicious, ill-typed code as an avenue of attack, though the Java Card platform offers some protection against this, notably by code signing. This paper gives an extensive overview of vulnerabilities and possible runtime countermeasures against ill-typed code, and describes results of experiments with attacking actual Java Cards currently on the market with malicious code. © IFIP International Federation for Information Processing 2008.

Cite

CITATION STYLE

APA

Mostowski, W., & Poll, E. (2008). Malicious code on Java Card smartcards: Attacks and countermeasures. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5189 LNCS, pp. 1–16). https://doi.org/10.1007/978-3-540-85893-5_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free