Memory Forensics of a Java Card Dump

Abstract : Nowadays several papers have shown the ability to dump the EEPROM area of several Java Cards leading to the disclosure of already loaded applet and data structure of the card. Such a reverse engineering process is costly and prone to errors. Currently there are no tools available to help the process. We propose here an approach to find in the raw data obtained after a dump, the area containing the code and the data. Then, once the code area has been identified, we propose to rebuilt the original binary Cap file in order to be able to obtain the source code of the applet stored in the card.
Type de document :
Communication dans un congrès
Marc Joye; Amir Moradi. Cardis 2014 - 13th International Conference Smart Card Research and Advanced Application Conference, Nov 2014, Paris, France. Springer, 8968, pp.3-17, 2015, LNCS - Lecture notes in computer science. 〈10.1007/978-3-319-16763-3_1〉
Liste complète des métadonnées

https://hal.inria.fr/hal-01250605
Contributeur : Jean-Louis Lanet <>
Soumis le : mardi 5 janvier 2016 - 09:23:23
Dernière modification le : mardi 16 janvier 2018 - 15:54:26
Document(s) archivé(s) le : jeudi 7 avril 2016 - 14:57:15

Fichier

14-CARDIS-JCDA.pdf
Fichiers produits par l'(les) auteur(s)

Identifiants

Citation

Jean-Louis Lanet, Guillaume Bouffard, Rokia Lamrani, Ranim Chakra, Afef Mestiri, et al.. Memory Forensics of a Java Card Dump. Marc Joye; Amir Moradi. Cardis 2014 - 13th International Conference Smart Card Research and Advanced Application Conference, Nov 2014, Paris, France. Springer, 8968, pp.3-17, 2015, LNCS - Lecture notes in computer science. 〈10.1007/978-3-319-16763-3_1〉. 〈hal-01250605〉

Partager

Métriques

Consultations de la notice

304

Téléchargements de fichiers

756