A friendly framework for hidding fault enabled virus for java based smartcard

10Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Smart cards are the safer device to execute cryptographic algorithms. Applications are verified before being loaded into the card. Recently, the idea of combined attacks to bypass byte code verification has emerged. Indeed, correct and legitimate Java Card applications can be dynamically modified on-card using a laser beam to become mutant applications or fault enabled viruses. We propose a framework for manipulating binary applications to design viruses for smart cards. We present development, experimentation and an example of this kind of virus. © 2012 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

Razafindralambo, T., Bouffard, G., & Lanet, J. L. (2012). A friendly framework for hidding fault enabled virus for java based smartcard. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7371 LNCS, pp. 122–128). https://doi.org/10.1007/978-3-642-31540-4_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free