Skip to Main content Skip to Navigation
Conference papers

Countermeasures Mitigation for Designing Rich Shell Code in Java Card

Noreddine Janati 1, * Said Elhajji 1 Jean-Louis Lanet 2
* Corresponding author
2 TAMIS - Threat Analysis and Mitigation for Information Security
Inria Rennes – Bretagne Atlantique , IRISA-D4 - LANGAGE ET GÉNIE LOGICIEL
Abstract : Recently, logical attacks have been published that target Java based smart card. They use dynamically a type confusion which is possible if type verification is not performed. Countermeasures have been introduced on recent smart card to avoid executing rich shell code and in particular dynamic bound checking of the code segment. We propose here a new attack path for performing a type confusion that leads to a Java based self modifying code. Then, we propose to improve the previous counter measure to mitigate this new attack.
Complete list of metadata

Cited literature [15 references]  Display  Hide  Download

https://hal.inria.fr/hal-01250590
Contributor : Jean-Louis Lanet <>
Submitted on : Tuesday, January 5, 2016 - 8:46:19 AM
Last modification on : Thursday, January 7, 2021 - 4:20:39 PM
Long-term archiving on: : Thursday, April 7, 2016 - 2:56:50 PM

File

richShellCode.pdf
Files produced by the author(s)

Identifiers

Citation

Noreddine Janati, Said Elhajji, Jean-Louis Lanet. Countermeasures Mitigation for Designing Rich Shell Code in Java Card. C2SI 2015 - First International Conference Codes, Cryptology, and Information Security, May 2015, Rabat, Morocco. pp.149-161, ⟨10.1007/978-3-319-18681-8_12⟩. ⟨hal-01250590⟩

Share

Metrics

Record views

539

Files downloads

391