Embedded eavesdropping on Java card

11Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this article we present the first Combined Attack on a Java Card targeting the APDU buffer itself, thus threatening both the security of the platform and of the hosted applications as well as the privacy of the cardholder. We show that such an attack, which combines malicious application and fault injection, is achievable in practice on the latest release of the Java Card specifications by presenting several case studies taking advantage for instance of the well-known GlobalPlatform and (U)SIM Application ToolKit. © 2012 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

Barbu, G., Giraud, C., & Guerin, V. (2012). Embedded eavesdropping on Java card. In IFIP Advances in Information and Communication Technology (Vol. 376 AICT, pp. 37–48). https://doi.org/10.1007/978-3-642-30436-1_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free