Improving Resiliency of JavaCard Code Against Power Analysis

Warning

This publication doesn't include Faculty of Sports Studies. It includes Faculty of Informatics. Official publication website can be found on muni.cz.
Authors

KŮR Jiří SMOLKA Tobiáš ŠVENDA Petr

Year of publication 2009
Type Article in Proceedings
Conference Santa's Crypto Get-Together 2009
MU Faculty or unit

Faculty of Informatics

Citation
Field Informatics
Keywords JavaCard; Power Analysis; Bytecode; Reverse Engineering; Security
Description The power analysis of smart cards is powerful side channel attack, originally introduced by Kocher et al. The observation of power consumption of smart card with high precision can be used to extract information about executed code as well as about the processed data. Our work describes ways how to obtain information about bytecode instruction from power trace, identify vulnerable operations leaking information about its operand and propose general framework for automatic replacement of vulnerable operations by safe equivalents. Practical implementation and examples of usage is presented and discussed.
Related projects:

You are running an old browser version. We recommend updating your browser to its latest version.

More info