Java card operand stack: fault attacks, combined attacks and countermeasures
Abstract Until 2009, Java Cards have been mainly threatened by Logical Attacks based on ill-
formed applications. The publication of the Java Card 3.0 Connected Edition specifications …
formed applications. The publication of the Java Card 3.0 Connected Edition specifications …
Embedded eavesdrop** on java card
In this article we present the first Combined Attack on a Java Card targeting the APDU buffer
itself, thus threatening both the security of the platform and of the hosted applications as well …
itself, thus threatening both the security of the platform and of the hosted applications as well …
A generic approach for protecting java card™ smart card against software attacks
G Bouffard - 2014 - theses.hal.science
Smart cards are the keystone of various applications which we daily use: pay money for
travel, phone, etc. To improve the security of this device with a friendly development …
travel, phone, etc. To improve the security of this device with a friendly development …
Chronicle of a Java Card death
M Farhadi, JL Lanet - Journal of Computer Virology and Hacking …, 2017 - Springer
Various attacks are designed to gain access to the assets of Java Card Platforms. These
attacks use software, hardware or a combination of both. Manufacturers have improved their …
attacks use software, hardware or a combination of both. Manufacturers have improved their …
On the security of Java Card platforms against hardware attacks
G Barbu - 2012 - pastel.hal.science
Smart cards play a key role in various applications we use on a daily basis: payment, mobile
communication, public transports, etc. In this context, the Java Card technology has evolved …
communication, public transports, etc. In this context, the Java Card technology has evolved …
Application-replay attack on Java Cards: when the garbage collector gets confused
Java Card 3.0 specifications have brought many new features in the Java Card world,
amongst which a true garbage collection mechanism. In this paper, we show how one could …
amongst which a true garbage collection mechanism. In this paper, we show how one could …
Logical attacks on secured containers of the Java Card platform
Abstract The Java Card platform provides programmers with API classes that act as
containers for cryptographic keys and PIN codes. This paper presents a first systematic …
containers for cryptographic keys and PIN codes. This paper presents a first systematic …
Reverse engineering a Java Card memory management algorithm
Smart cards are tamper resistant devices that manipulate assets in a secure way. Among the
assets, one is of a particular interest the native layers. If some attacks have succeeded in …
assets, one is of a particular interest the native layers. If some attacks have succeeded in …
Synchronized attacks on multithreaded systems-application to java card 3.0
G Barbu, H Thiebeauld - Smart Card Research and Advanced Applications …, 2011 - Springer
Up to now devices in charge of performing secure transactions mainly remained limited
regarding their functionalities. However the trend has recently gone towards an increasing …
regarding their functionalities. However the trend has recently gone towards an increasing …
Detecting attacks on java cards by fingerprinting applets
G Morana, E Tramontana, D Zito - 2013 Workshops on …, 2013 - ieeexplore.ieee.org
Differently from classical JVMs, generally JavaCard Virtual Machines (JCVMs) rely only on
limited amount of resources typical of smart cards. Recently, several mixes of logical and …
limited amount of resources typical of smart cards. Recently, several mixes of logical and …