Vulnerability Analysis on Smart Cards Using Fault Tree
نویسندگان
چکیده
In smart card domain, attacks and countermeasures are advancing at a fast rate. In order to have a generic view of all the attacks, we propose to use a Fault Tree Analysis. This method used in safety analysis helps to understand and implement all the desirable and undesirable events existing in this domain. We apply this method to Java Card vulnerability analysis. We define the properties that must be ensured: integrity and confidentiality of smart card data and code. By modeling the conditions, we discovered new attack paths to get access to the smart card contents. Then we introduce a new security api which is proposed to mitigate the undesirable events defined in the tree models.
منابع مشابه
Lazart: a symbolic approach for evaluating the robustness of secured codes against control flow fault injections
In the domain of smart cards, secured devices must be protected against high level attack potential [1]. According to norms such as the Common Criteria [2], the vulnerability analysis must cover the current state-of-the-art in term of attacks. Nowadays, a very classical type of attack is fault injection, conducted by means of laser based techniques. We propose a global approach, called Lazart, ...
متن کامل8 Fingerprint Authentication System For Smart Cards
Among the several methods that enable fingerprint authentication of card holders, the one that executes the matehing process on the smart card chip is the most important. The Pattern matehing method, such as [1] , is of no use for smart cards, because it takes too much time to adjust the position between the input image and template image. So we have developed an algorithm (FTA: Free Turning Al...
متن کاملSecure Cryptographic Algorithm Implementation on Embedded Platforms
Sensitive systems that are based on smart cards use well-studied and well-developed cryptosystems. Generally these cryptosystems have been subject to rigorous mathematical analysis in an effort to uncover cryptographic weaknesses in the system. The cryptosystems used in smart cards are, therefore, not usually vulnerable to these types of attacks. Since smart cards are small objects that can be ...
متن کاملFault Detection in Ring Based Smart LVDC Microgrid Using Ensemble of Decision Tree
In modern infrastructure, the demand for DC power-based appliances is rapidly increasing, and this phenomenon has created a positive impact on the acceptance of the DC microgrid. However, due to numerous issues such as the absence of zero crossing, bidirectional behaviour of sources, and different magnitudes of fault current during grid connected and islanded modes of operation, protecting DC m...
متن کاملOptical and EM Fault-Attacks on CRT-based RSA: Concrete Results
RSA is a well-known algorithm that is used in various cryptographic systems like smart cards and e-commerce applications. This article presents practical attacks on implementations of RSA that use the Chinese Remainder Theorem (CRT). The attacks have been performed by inducing faults into a cryptographic device through optical and electromagnetic injections. We show optical attacks using fibre-...
متن کامل