Abstract : Smart cards are the safer device to execute cryptographic algorithms. Applications are verified before being loaded into the card. Recently, the idea of combined attacks to bypass byte code verification has emerged. Indeed, correct and legitimate Java Card applications can be dynamically modified on-card using a laser beam to become mutant applications or fault enabled viruses. We propose a framework for manipulating binary applications to design viruses for smart cards. We present development, experimentation and an example of this kind of virus.
https://hal.archives-ouvertes.fr/hal-00937307
Contributor : Yolande Vieceli <>
Submitted on : Thursday, June 8, 2017 - 11:14:36 AM Last modification on : Friday, February 26, 2021 - 4:08:04 PM Long-term archiving on: : Saturday, September 9, 2017 - 12:57:22 PM
Tiana Razafindralambo, Guillaume Bouffard, Jean-Louis Lanet. A friendly framework for hidding fault enabled virus for Java based smartcard. 26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.122-128, ⟨10.1007/978-3-642-31540-4_10⟩. ⟨hal-00937307⟩