Embedded Forensics: An Ongoing Research about SIM/USIM Cards
نویسندگان
چکیده
The purpose of this section is to give an overview on smart cards used in the telecommunications field by detailing the main building blocks, their functions and how they are related to each other. Generally speaking, smart cards belong to the group of identification cards using a ID--1 format formally defined in ISO Standard 7810, Identification Cards -Physical Characteristics. This standard specifies the physical properties, such as mechanical flexibility and temperature resistance, of four types of cards, namely ID--1, used for banking cards such as ATM (Automatic Teller Machine) cards, credit cards, and debit cards; ID--2, prevalently used for identity documents; ID--3, used worldwide for passports and AbsTRACT
منابع مشابه
Digital Forensic Analysis of SIM Cards
Smart cards are fundamental technology in modern life. It is embedded in numerous devices such as GPS devices, ATM cards, Mobile SIM cards and many others. Mobile devices became the evolution of technology. It becomes smaller, faster and supports large storage capabilities. Digital forensics of mobile devices that maybe found in crime scene is becoming inevitable. The purpose of this research i...
متن کاملForensics and SIM Cards: An Overview
Nowadays there are many tools for the extraction of data objects [SWGDE] from SIM cards; unfortunately, most of them are proprietary, or their use is restricted to law enforcement and this is contrary to the Daubert test for acceptability from the scientific community. In this paper, we present an open source tool for data objects extraction from SIM and USIM cards which is capable of extractin...
متن کاملSmall Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards
Side-channel attacks are an increasingly important concern for the security of cryptographic embedded devices, such as the SIM cards used in mobile phones. Previous works have exhibited such attacks against implementations of the 2G GSM algorithms (COMP-128, A5). In this paper, we show that they remain an important issue for USIM cards implementing the AES-based MILENAGE algorithm used in 3G/4G...
متن کاملSecuring USIM-based Mobile Communications from Interoperation of SIM-based Communications
Mobile networks security is constantly evolving and adapting to meet the needs of users and network operators. It is a requirement that there be interoperation of legacy security frameworks into modern mobile networks. Mobile networks originally had no real security which proved to be a deployment that was attacked constantly and the providers were defrauded of millions of dollars. To address t...
متن کامل