首页> 外文会议>Smart Card Research and Advanced Applications >Malicious Code on Java Card Smartcards: Attacks and Countermeasures
【24h】

Malicious Code on Java Card Smartcards: Attacks and Countermeasures

机译:Java卡智能卡上的恶意代码:攻击和对策

获取原文
获取原文并翻译 | 示例

摘要

When it comes to security, an interesting difference between Java Card and regular Java is the absence of an on-card bytecode verifier on most Java Cards. In principle this opens up the possibility of malicious, ill-typed code as an avenue of attack, though the Java Card platform offers some protection against this, notably by code signing. This paper gives an extensive overview of vulnerabilities and possible runtime countermeasures against ill-typed code, and describes results of experiments with attacking actual Java Cards currently on the market with malicious code.
机译:在安全性方面,Java Card与常规Java之间一个有趣的区别是,大多数Java Card上都没有卡片上的字节码验证程序。原则上,这开辟了将恶意的,类型错误的代码作为攻击途径的可能性,尽管Java Card平台提供了一些针对此的保护措施,尤其是通过代码签名。本文全面概述了针对不良代码的漏洞和可能的运行时对策,并描述了利用恶意代码攻击当前市场上实际的Java Card的实验结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号