Skip to Main content Skip to Navigation
Conference papers

Countermeasures Mitigation for Designing Rich Shell Code in Java Card

Noreddine Janati 1, * Said Elhajji 1 Jean-Louis Lanet 2 
* Corresponding author
2 TAMIS - Threat Analysis and Mitigation for Information Security
Inria Rennes – Bretagne Atlantique , IRISA-D4 - LANGAGE ET GÉNIE LOGICIEL
Abstract : Recently, logical attacks have been published that target Java based smart card. They use dynamically a type confusion which is possible if type verification is not performed. Countermeasures have been introduced on recent smart card to avoid executing rich shell code and in particular dynamic bound checking of the code segment. We propose here a new attack path for performing a type confusion that leads to a Java based self modifying code. Then, we propose to improve the previous counter measure to mitigate this new attack.
Complete list of metadata

Cited literature [15 references]  Display  Hide  Download
Contributor : Jean-Louis Lanet Connect in order to contact the contributor
Submitted on : Tuesday, January 5, 2016 - 8:46:19 AM
Last modification on : Thursday, August 11, 2022 - 1:14:05 PM
Long-term archiving on: : Thursday, April 7, 2016 - 2:56:50 PM


Files produced by the author(s)



Noreddine Janati, Said Elhajji, Jean-Louis Lanet. Countermeasures Mitigation for Designing Rich Shell Code in Java Card. C2SI 2015 - First International Conference Codes, Cryptology, and Information Security, May 2015, Rabat, Morocco. pp.149-161, ⟨10.1007/978-3-319-18681-8_12⟩. ⟨hal-01250590⟩



Record views


Files downloads