Recently, it has been published that Java based smart cards are still exposed to logical attacks. These attacks take advantage of the lack of a full verification and dynamically use a type of confusion. Countermeasures have been introduced on recent smart card to avoid executing rich shell code and particulary dynamic bound checking of the code segment. We propose here a new attack path for performing a type confusion that leads to a Java based self modifying code. Then, to mitigate this new attack an improvement to the previous countermeasure is proposed.
CITATION STYLE
El Idrissi, N. E. J., El Hajji, S., & Lanet, J. L. (2015). Countermeasures mitigation for designing rich shell code in Java card. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9084, pp. 149–161). Springer Verlag. https://doi.org/10.1007/978-3-319-18681-8_12
Mendeley helps you to discover research relevant for your work.