Java Card Operand Stack : Fault Attacks, Combined Attacks and Countermeasures - Smart Card Research and Advanced Applications
Conference Papers Year : 2011

Java Card Operand Stack : Fault Attacks, Combined Attacks and Countermeasures

Abstract

Until 2009, Java Cards have been mainly threatened by Logical Attacks based on ill-formed applications. The publication of the Java Card 3.0 Connected Edition specifications and their mandatory on-card byte code verification may have then lead to the end of software-based attacks against such platforms. However, the introduction in the Java Card field of Fault Attacks, well-known from the cryptologist community, has proven this conclusion wrong. Actually, the idea of combining Fault Attacks and Logical Attacks to tamper with Java Cards appears as an even more dangerous threat. Although the operand stack is a fundamental element of all Java Card Virtual Machines, the potential consequences of a physical perturbation of this element has never been studied so far. In this article, we explore this path by presenting both Fault Attacks and Combined Attacks taking advantage of an alteration of the operand stack. In addition, we provide experimental results proving the practical feasibility of these attacks and illustrating their efficiency. Finally, we describe different approaches to protect the operand stack's integrity and compare their cost with a particular interest on the time factor.
Fichier principal
Vignette du fichier
draft.pdf (171.32 Ko) Télécharger le fichier
Origin Files produced by the author(s)
Loading...

Dates and versions

hal-00692171 , version 1 (28-04-2012)

Licence

Identifiers

Cite

Guillaume Barbu, Guillaume Duc, Philippe Hoogvorst. Java Card Operand Stack : Fault Attacks, Combined Attacks and Countermeasures. 10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.297-313, ⟨10.1007/978-3-642-27257-8_19⟩. ⟨hal-00692171⟩
579 View
396 Download

Altmetric

Share

More