Abstract : We present in this paper a new approach to gain access to
assets of a smart card. It is based on the concept of reference forgery
and array extension. We characterize the meta data of the system using
different level of expertize from human know-hows to formal methods.
We are able to generate arbitrary but well formed references which allow
us to execute self modifying Java program inside the card. This hostile
program is able to dump the complete Non Volatile Memory (NVM)
memory segment. Then we develop a graphical representation of the
objects belonging to the system for gaining abstraction of the binary
dump.
https://hal.inria.fr/hal-01385202
Contributeur : Jean-Louis Lanet
<>
Soumis le : vendredi 21 octobre 2016 - 08:16:20
Dernière modification le : mercredi 11 avril 2018 - 01:51:08
Abdelhak Mesbah, Leo Regnaud, Jean-Louis Lanet, Mohamed Mezghiche. The Hell Forgery, Polymorphic Codes Shoot Again. 15th Smart Card Research and Advanced Application Conference , Nov 2016, Cannes, France. 〈https://2016.cardis.org/〉. 〈hal-01385202〉