【24h】

Detecting Attacks on Java Cards by Fingerprinting Applets

机译:通过指纹小程序检测对Java卡的攻击

获取原文
获取原文并翻译 | 示例

摘要

Differently from classical JVMs, generally JavaCard Virtual Machines (JCVMs) rely only on limited amount of resources typical of smart cards. Recently, several mixes of logical and physical manoeuvres have been devised to exploit typical JCVM weaknesses and to have mutant applets by means e.g. of faults injection. Such combined attacks manage to bypass the existing countermeasures of several versions of JCVMs. This paper proposes an approach for detecting mutant applets, as soon as they appear at runtime, hence revealing and thwarting an ongoing attack. The approach is completely transparent to the applet's developer, and only a limited (a priori computable) amount of resources are used at runtime, hence it is affordable on board of smart cards. Our experiments have shown that the proposed solution has only a very limited impact on the performances of the target platform.
机译:与传统的JVM不同,JavaCard虚拟机(JCVM)通常仅依赖智能卡典型的有限资源。近来,已经设计了几种逻辑和物理操作的组合,以利用典型的JCVM弱点并通过例如故障注入。这种组合攻击设法绕过了几种版本的JCVM的现有对策。本文提出了一种在运行时出现突变小程序的情况下对其进行检测的方法,从而揭示并阻止了正在进行的攻击。该方法对于applet的开发人员是完全透明的,并且在运行时仅使用了有限的资源(可计算的资源),因此在智能卡上负担得起。我们的实验表明,所提出的解决方案对目标平台的性能影响很小。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号