Countermeasures mitigation for designing rich shell code in Java card

0Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recently, it has been published that Java based smart cards are still exposed to logical attacks. These attacks take advantage of the lack of a full verification and dynamically use a type of confusion. Countermeasures have been introduced on recent smart card to avoid executing rich shell code and particulary dynamic bound checking of the code segment. We propose here a new attack path for performing a type confusion that leads to a Java based self modifying code. Then, to mitigate this new attack an improvement to the previous countermeasure is proposed.

Cite

CITATION STYLE

APA

El Idrissi, N. E. J., El Hajji, S., & Lanet, J. L. (2015). Countermeasures mitigation for designing rich shell code in Java card. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9084, pp. 149–161). Springer Verlag. https://doi.org/10.1007/978-3-319-18681-8_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free