首页> 外文OA文献 >Link-time smart card code hardening
【2h】

Link-time smart card code hardening

机译:链接时智能卡代码强化

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

This paper presents a feasibility study to protect smart card software against fault-injection attacks by means of link-time code rewriting. This approach avoids the drawbacks of source code hardening, avoids the need for manual assembly writing, and is applicable in conjunction with closed third-party compilers. We implemented a range of cookbook code hardening recipes in a prototype link-time rewriter and evaluate their coverage and associated overhead to conclude that this approach is promising. We demonstrate that the overhead of using an automated link-time approach is not significantly higher than what can be obtained with compile-time hardening or with manual hardening of compiler-generated assembly code.
机译:本文提出了通过链接时代码重写来保护智能卡软件免受故障注入攻击的可行性研究。这种方法避免了源代码强化的弊端,避免了手动汇编的需要,并且可与封闭的第三方编译器结合使用。我们在原型链接时重写器中实现了一系列食谱代码强化配方,并评估了它们的覆盖范围和相关开销,以得出结论这种方法很有希望。我们证明,使用自动链接时方法的开销不会比使用编译时强化或手动强化编译器生成的汇编代码所获得的开销高得多。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号