【24h】

Detecting Attacks on Java Cards by Fingerprinting Applets

机译:通过指纹小程序检测Java卡的攻击

获取原文

摘要

Differently from classical JVMs, generally JavaCard Virtual Machines (JCVMs) rely only on limited amount of resources typical of smart cards. Recently, several mixes of logical and physical manoeuvres have been devised to exploit typical JCVM weaknesses and to have mutant applets by means e.g. of faults injection. Such combined attacks manage to bypass the existing countermeasures of several versions of JCVMs. This paper proposes an approach for detecting mutant applets, as soon as they appear at runtime, hence revealing and thwarting an ongoing attack. The approach is completely transparent to the applet's developer, and only a limited (a priori computable) amount of resources are used at runtime, hence it is affordable on board of smart cards. Our experiments have shown that the proposed solution has only a very limited impact on the performances of the target platform.
机译:与古典JVM不同,一般javacard虚拟机(JCVM)仅依赖于智能卡典型的有限资源。最近,已经设计了几种逻辑和物理演习的混合来利用典型的JCVM弱点,并通过例如具有突变小物流。缺口注射。这种组合攻击管理绕过几个版本的JCVMS的现有对策。本文提出了一种方法来检测突变物小程序的方法,只要它们在运行时出现,因此露出并挫败正在进行的攻击。该方法对Applet的开发人员来说是完全透明的,并且在运行时仅使用有限的(先验的可计算)资源量,因此它在智能卡的船上是负担得起的。我们的实验表明,所提出的解决方案仅对目标平台的性能影响非常有限。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号