Logical attacks on smart cards have been used for many years, but their attack potential is hindered by the processes used by issuers to verify the validity of code, in particular bytecode verification. More recently, the idea has emerged to combine logical attacks with a physical attack, in order to evade bytecode verification. We present practical work done recently on this topic, as well as some countermeasures that can be put in place against such attacks, and how they can be evaluated by security laboratories. © IFIP International Federation for Information Processing 2010.
CITATION STYLE
Vetillard, E., & Ferrari, A. (2010). Combined attacks and countermeasures. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6035 LNCS, pp. 133–147). https://doi.org/10.1007/978-3-642-12510-2_10
Mendeley helps you to discover research relevant for your work.