%0 Conference Proceedings %T Attacks on Java Card 3.0 Combining Fault and Logical Attacks %+ Laboratoire Traitement et Communication de l'Information (LTCI) %+ Oberthur Technologies %A Barbu, Guillaume %A Thiebeauld, Hugues %A Guerin, Vincent %< avec comité de lecture %( Smart Card Research and Advanced Application. 9th IFIP WG 8.8/11.2 International Conference %B Smart Card Research and Advanced Application. 9th IFIP WG 8.8/11.2 International Conference. CARDIS 2010 %C Passau, Germany %Y Dieter Gollmann %Y Jean-Louis Lanet %Y Julien Iguchi-Cartigny %I Springer %3 Lecture Notes in Computer Science / Security & Cryptology %V 6035 %P 148-163 %8 2010-04-14 %D 2010 %R 10.1007/978-3-642-12510-2_11 %K Java Card 3 %K Combined Attack %K Fault Injection %K Logical Attack %Z Computer Science [cs]/Cryptography and Security [cs.CR]Conference papers %X Java Cards have been threatened so far by attacks using ill-formed applications which assume that the application bytecode is not verified. This assumption remained realistic as long as the bytecode verifier was commonly executed off-card and could thus be bypassed. Nevertheless it can no longer be applied to the Java Card 3 Connected Edition context where the bytecode verification is necessarily performed on-card. Therefore Java Card 3 Connected Edition seems to be immune against this kind of attacks. In this paper, we demonstrate that running ill-formed application does not necessarily mean loading and installing ill-formed application. For that purpose, we introduce a brand new kind of attack which combines fault injection and logical tampering. By these means, we describe two case studies taking place in the new Java Card 3 context. The first one shows how ill-formed applications can still be introduced and executed despite the on-card bytecode verifier. The second example leads to the modification of any method already installed on the card into any malicious bytecode. Finally we successfully mount these attacks on a recent device, emphasizing the necessity of taking into account these new threats when implementing Java Card 3 features. %G English %2 https://hal.science/hal-00692165/document %2 https://hal.science/hal-00692165/file/CombinedAttackonJC3.pdf %L hal-00692165 %U https://hal.science/hal-00692165 %~ INSTITUT-TELECOM %~ CNRS %~ ENST %~ TELECOM-PARISTECH %~ PARISTECH %~ IFIP-LNCS %~ IFIP %~ IFIP-LNCS-6035 %~ LTCI %~ INSTITUTS-TELECOM