【24h】

Reverse Engineering Java Card Applets Using Power Analysis

机译:使用功耗分析对Java卡小程序进行逆向工程

获取原文
获取原文并翻译 | 示例

摘要

Power analysis on smart cards is widely used to obtain information about implemented cryptographic algorithms. We propose similar methodology for Java Card applets reverse engineering. Because power analysis alone does not provide enough information, we refine our methodology by involving additional information sources. Issues like distinguishing between bytecodes performing similar tasks and reverse engineering of conditional branches and nested loops are also addressed. The proposed methodology is applied to a commercially available Java Card smart card and the results are reported. We conclude that our augmented power analysis can be successfully used to acquire information about the bytecodes executed on a Java Card smart card.
机译:智能卡上的功率分析被广泛用于获取有关已实施的加密算法的信息。我们为Java Card applet逆向工程提出了类似的方法。因为仅功率分析不能提供足够的信息,所以我们通过涉及其他信息源来完善我们的方法。还解决了诸如区分执行类似任务的字节码以及对条件分支和嵌套循环进行反向工程之类的问题。所提出的方法应用于市售的Java Card智能卡,并报告了结果。我们得出结论,我们的增强功率分析可以成功地用于获取有关在Java Card智能卡上执行的字节码的信息。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号