Trust Can be Misplaced

Abstract : Retrieving assets inside a secure element is a challenging task. The most attractive assets are the cryptographic keys stored into the non volatile memory (NVM) area. Most of the researches try to obtain them through side channel attacks or fault attacks. Such cryptographic objects are stored into secure containers. We demonstrate in this paper how one can use some characteristics of the Java Card platform to gain access to these assets. Such a smart card embeds a firewall that provides isolation between applets from different clients (using the notion of security contexts). We exploit the client/server architecture of the intra platform communication to lure a client application to execute within its security context, a hostile code written and called from another security context: the server security context. This attack shows the possibility for a trusted application to execute within its security context some hostile code uploaded previously by the server.
Type de document :
Article dans une revue
Journal of Cryptographic Engineering, Springer, 2016, 〈10.1007/s13389-016-0142-5〉
Liste complète des métadonnées

https://hal.inria.fr/hal-01405463
Contributeur : Jean-Louis Lanet <>
Soumis le : mercredi 30 novembre 2016 - 08:45:16
Dernière modification le : mardi 16 janvier 2018 - 15:54:26

Identifiants

Citation

Noreddine Janati, Guillaume Bouffard, Jean-Louis Lanet, Said Elhajji. Trust Can be Misplaced. Journal of Cryptographic Engineering, Springer, 2016, 〈10.1007/s13389-016-0142-5〉. 〈hal-01405463〉

Partager

Métriques

Consultations de la notice

180