Checking the Paths to Identify Mutant Application on Embedded Systems

نویسندگان

  • Ahmadou Al Khary Séré
  • Julien Iguchi-Cartigny
  • Jean-Louis Lanet
چکیده

The resistance of Java Card against attack is based on software and hardware countermeasures, and the ability of the Java platform to check the correct behaviour of Java code (by using bytecode verification for instance). Recently, the idea to combine logical attacks with a physical attack in order to bypass bytecode verification has emerged. For instance, correct and legitimate Java Card applications can be dynamically modified on-card using laser beam. Such applications become mutant applications, with a different control flow from the original expected behaviour. This internal change could lead to bypass control and protection and thus offer illegal access to secret data and operation inside the chip. This paper presents an evaluation of the ability of an application to become mutant and a new countermeasure based on the runtime check of the application control flow to detect the deviant mutations. . . .

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reachability checking in complex and concurrent software systems using intelligent search methods

Software system verification is an efficient technique for ensuring the correctness of a software product, especially in safety-critical systems in which a small bug may have disastrous consequences. The goal of software verification is to ensure that the product fulfills the requirements. Studies show that the cost of finding and fixing errors in design time is less than finding and fixing the...

متن کامل

Functional verification on PIL mode with IAR Embedded Workbench

Nowadays, the most common tools and solutions available on the market for verifying ESW are based on structural code analysis and concentrate on checking that all structural items, e.g., executable statements, branches, and paths, within the ESW application have been exercised. A much more important and expensive task consists of checking if the software respects what is specified by its requir...

متن کامل

Functional verification on PIL mode with IAR Embedded Workbench

Nowadays, the most common tools and solutions available on the market for verifying ESW are based on structural code analysis and concentrate on checking that all structural items, e.g., executable statements, branches, and paths, within the ESW application have been exercised. A much more important and expensive task consists of checking if the software respects what is specified by its requir...

متن کامل

Introduction to Schramm-Loewner evolution and its application to critical systems

In this short review we look at recent advances in Schramm-Loewner Evolution (SLE) theory and its application to critical phenomena. The application of SLE goes beyond critical systems to other time dependent, scale invariant phenomena such as turbulence, sand-piles and watersheds. Through the use of SLE, the evolution of conformally invariant paths on the complex plane can be followed; hence a...

متن کامل

Application Development for Safety Critical Distributed Embedded Systems with Model Verification

The increasing use of distributed applications in real-time and safety critical embedded systems results in the need for functional and non-functional system verification in the design process. This paper proposes model verification as solution to identify concept ional design failures in advance, and to verify model correctness in an abstract level. With an extension to classical model checkin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010