Trust Can be Misplaced - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Article Dans Une Revue Journal of Cryptographic Engineering Année : 2016

Trust Can be Misplaced

Résumé

Retrieving assets inside a secure element is a challenging task. The most attractive assets are the cryptographic keys stored into the non volatile memory (NVM) area. Most of the researches try to obtain them through side channel attacks or fault attacks. Such cryptographic objects are stored into secure containers. We demonstrate in this paper how one can use some characteristics of the Java Card platform to gain access to these assets. Such a smart card embeds a firewall that provides isolation between applets from different clients (using the notion of security contexts). We exploit the client/server architecture of the intra platform communication to lure a client application to execute within its security context, a hostile code written and called from another security context: the server security context. This attack shows the possibility for a trusted application to execute within its security context some hostile code uploaded previously by the server.
Fichier non déposé

Dates et versions

hal-01405463 , version 1 (30-11-2016)

Identifiants

Citer

Noreddine Janati, Guillaume Bouffard, Jean-Louis Lanet, Said Elhajji. Trust Can be Misplaced. Journal of Cryptographic Engineering, 2016, ⟨10.1007/s13389-016-0142-5⟩. ⟨hal-01405463⟩
197 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More