HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation
Conference papers

Beyond Cryptanalysis is Software Security the Next Threat for Smart Cards

Jean-Louis Lanet 1, *
* Corresponding author
1 TAMIS - Threat Analysis and Mitigation for Information Security
IRISA-D4 - LANGAGE ET GÉNIE LOGICIEL, Inria Rennes – Bretagne Atlantique
Abstract : Smart cards have been considered for a long time as a secure container for storing secret data and executing programs that manipulate them without leaking any information. In the last decade, a new form of attack that uses the hardware has been intensively studied. We have proposed in the past to pay attention also to easier attacks that use only software. We demonstrated through several proof of concepts that such an approach should be a threat under some hypotheses. We have been able to execute self-modifying code, return address programming and so on. More recently we have been able to retrieve secret keys belonging to another application. Then all the already published attacks should have been a threat but the industry increased the counter measures to mitigate for each of the published attack. In such a sensitive domain, we always submit the attacks to the industrial partners but also national agencies before publishing any attack. Within such an approach, they have been able to patch their system before any vulnerabilities should be exploited.
Complete list of metadata

Cited literature [13 references]  Display  Hide  Download

Contributor : Jean-Louis Lanet Connect in order to contact the contributor
Submitted on : Tuesday, January 5, 2016 - 8:29:27 AM
Last modification on : Friday, February 4, 2022 - 3:22:38 AM
Long-term archiving on: : Thursday, April 7, 2016 - 2:56:37 PM


Files produced by the author(s)



Jean-Louis Lanet. Beyond Cryptanalysis is Software Security the Next Threat for Smart Cards. C2SI 2015 - First International Conference Codes, Cryptology, and Information Security, May 2015, Rabat, Morocco. pp.74-82, ⟨10.1007/978-3-319-18681-8_6⟩. ⟨hal-01250585⟩



Record views


Files downloads