首页> 外文期刊>Concurrency and computation: practice and experience >A taxonomy of various attacks on smart card–based applications and countermeasures
【24h】

A taxonomy of various attacks on smart card–based applications and countermeasures

机译:对智能卡的应用和对策各种攻击的分类和对策

获取原文
获取原文并翻译 | 示例

摘要

Deployment of smart card-based applications is becoming prevalent these days. Security of these applications depends upon the nature of underlying hardware and software platforms, cryptographic algorithms, along with a number of other security mechanisms. To develop a secure smart card-based application, preliminary evaluation of the security of embedded software as well as how that software will work in real time is required. Over the past few years, significant improvements have been made in smart card technology for its large-scale acceptance. However, attackers are in continuous search for exploiting the unknown issues related to this technology. This survey discusses smart card technology in detail and provides a comprehensive taxonomy of security attacks on smart card-based applications and their countermeasures. In addition, it covers some of the open source tools available for its development. Finally, it provides a brief outline of some of the major open challenges and future research directions that are yet to be explored.
机译:这些天智能卡的应用部署正在普遍存在。这些应用程序的安全性取决于底层硬件和软件平台,加密算法以及许多其他安全机制的性质。为了开发基于安全的智能卡的应用程序,对嵌入式软件的安全性的初步评估以及该软件如何实时工作。在过去的几年里,智能卡技术已经进行了重大改进,以实现大规模的验收。但是,攻击者正在持续搜索利用与此技术相关的未知问题。本调查详细讨论了智能卡技术,并提供了对智能卡的应用和对策的安全攻击的综合分类。此外,它还涵盖了一些可用于其开发的开源工具。最后,它提供了一些尚未探索的一些主要开放挑战和未来研究方向的简要概述。

著录项

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号