Improving Resiliency of JavaCard Code Against Power Analysis
Autoři | |
---|---|
Rok publikování | 2009 |
Druh | Článek ve sborníku |
Konference | Santa's Crypto Get-Together 2009 |
Fakulta / Pracoviště MU | |
Citace | |
Obor | Informatika |
Klíčová slova | JavaCard; Power Analysis; Bytecode; Reverse Engineering; Security |
Popis | The power analysis of smart cards is powerful side channel attack, originally introduced by Kocher et al. The observation of power consumption of smart card with high precision can be used to extract information about executed code as well as about the processed data. Our work describes ways how to obtain information about bytecode instruction from power trace, identify vulnerable operations leaking information about its operand and propose general framework for automatic replacement of vulnerable operations by safe equivalents. Practical implementation and examples of usage is presented and discussed. |
Související projekty: |