Skip to Main content Skip to Navigation
Conference papers

Heap . . . Hop! Heap Is Also Vulnerable

Abstract : Several logical attacks against Java based smart card have been published recently. Most of them are based on the hypothesis that the type verification was not performed, thus allowing to obtain dynamically a type confusion. To mitigate such attacks, typed stack have been introduced on recent smart card. We propose here a new attack path for performing a type confusion even in presence of a typed stack. Then we propose using a Fault Tree Analysis a way to design efficiently counter measure in a top down approach. These counter measures are then evaluated on a Java Card virtual machine
Complete list of metadata

Cited literature [19 references]  Display  Hide  Download

https://hal.inria.fr/hal-01250610
Contributor : Jean-Louis Lanet <>
Submitted on : Tuesday, January 5, 2016 - 9:29:40 AM
Last modification on : Friday, February 26, 2021 - 4:08:04 PM
Long-term archiving on: : Thursday, April 7, 2016 - 2:59:06 PM

File

CardisHeapHop.pdf
Files produced by the author(s)

Identifiers

Citation

Guillaume Bouffard, Michael Lackner, Jean-Louis Lanet, Johannes Loinig. Heap . . . Hop! Heap Is Also Vulnerable. Cardis 2014, Nov 2014, Paris, France. ⟨10.1007/978-3-319-16763-3_2⟩. ⟨hal-01250610⟩

Share

Metrics