Attacking smart card systems: Theory and practice

نویسندگان

  • Konstantinos Markantonakis
  • Michael Tunstall
  • Gerhard P. Hancke
  • Ioannis G. Askoxylakis
  • Keith Mayes
چکیده

Smart card technology has evolved over the last few years following notable improvements in the underlying hardware and software platforms. Advanced smart card microprocessors, along with robust smart card operating systems and platforms, contribute towards a broader acceptance of the technology. These improvements have eliminated some of the traditional smart card security concerns. However, researchers and hackers are constantly looking for new issues and vulnerabilities. In this article we provide a brief overview of the main smart card attack categories and their corresponding countermeasures. We also provide examples of well-documented attacks on systems that use smart card technology (e.g. satellite TV, EMV, proximity identification) in an attempt to highlight the importance of the security of the overall system rather than just the smart card. a 2009 Elsevier Ltd. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Smart card abstract pdf

smart card abstract pdf Smart cards are used in information technologies as portable integrated.Abstract: While mobile handheld devices provide productivity benefits, they also pose. Paper describes two novel types of smart card with unconventional form factors. smart card abstract ppt Pdf.ABSTRACT Over the past few years, smart cards have achieved a growing acceptance as a powerful tool for se...

متن کامل

Triggering the Smart Card Readers Supply Chain

In the last 12 years or so, many governments have launched modern identity management systems. These systems typically integrate a set of advanced and complex technologies to provide identification and authentication capabilities. The major output of such systems is smart identity cards that bind the cardholders’ identities to their biographical data and one or more biometric characteristics. T...

متن کامل

Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards

The design of secure and efficient smart-card-based password authentication schemes remains a challenging problem today despite two decades of intensive research in the security community, and the current crux lies in how to achieve truly two-factor security even if the smart cards can be tampered. In this paper, we analyze two recent proposals, namely, Hsieh-Leu’s scheme and Wang’s PSCAV schem...

متن کامل

Countermeasures for Hardware Fault Attack in Multi-Prime RSA Cryptosystems

The study of countermeasures for hardware fault attack in multi-prime RSA cryptosystems is very important for applications such as computer network and smart cards. In this paper, an efficient countermeasure method is proposed for the FPGA-based multi-prime RSA systems. The proposed method can survive the attacks [27, 30] that broke the previous methods [5, 33]. Furthermore, by using a simple o...

متن کامل

The Demand for Stored Value Payment Instruments

Due to their functionality, stored value purses based on smart card technology are prominent candidates for being the dominant medium of exchange for micropayments. However, the overall prospects of these payment systems are yet ambiguous, both from the perspective of practice and monetary theory, because their potential to substitute for cash is still largely unknown. As a contribution to the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Inf. Sec. Techn. Report

دوره 14  شماره 

صفحات  -

تاریخ انتشار 2009