An Efficient and Simple Way to Test the Security of Java CardsTM
نویسندگان
چکیده
Till recently it was impossible to have more than one single application running on a smart card. Multiapplication cards, and especially Java Cards, now make it possible to have several applications sharing the same physical piece of plastic. Today, these cards accept to load code only after an authentication. But in the future, the cards will be open an everybody should be authorized to upload an application. This raises new security problems by creating additional ways to attack Java Cards. These problems and the method to test them are the topic of this paper. The attacks will be illustrated with code samples. The method presented here can be applied right now by authorised people (e.g. Information Technology Evaluation Facility – ITSEF) to test the security of Java Cards since they have the authentication keys and tomorrow a hacker may also be able to use this method to attack cards without needing the keys.
منابع مشابه
An Analysis of the Local Resources Potential to Achieve Food Security in Jombang and Probolinggo Regencies East Java Indonesia
This study aims at analyzing the characteristics of the food need in the area of Jombang and Probolinggo regencies as well as developing a model of local superiority-based policy to achieve the food security. This study employs descriptive qualitative approach. This study is carried out in eight months in March to October 2015. The respondent of the study is the governmental staff of Jombang an...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملA Simple, Artistic and Efficient Modification of the Inversion Method
The simplest and fastest way of producing an acceptable and accurate cast is by adopting the two-pour or inversion method. This process is slightly cumbersome and messy due to difficulty of access. A much more efficient, easy and artistic way of accomplishing it is described by adopting a Rotating Cake Icing Table with a Silicone Baking Mat on top as an autoclavable non-stick barrier.
متن کاملTesting Weak-Form Efficient Capital Market Case Study: TSE and DJUS Indices
The present study investigated weak-form market information efficiency in Tehran security exchange (TSE) as an emerging market and in Dow Jones United States security exchange (DJUS) as a developed market based on random walk model. In each market, the random walk model was examined using daily and monthly returns of a set of indices. The results of the parametric and non-parametric tests indic...
متن کاملSecure FPGA Design by Filling Unused Spaces
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
متن کامل