License
When quoting this document, please refer to the following
URN: urn:nbn:de:0030-drops-24010
URL: http://drops.dagstuhl.de/opus/volltexte/2010/2401/
Go to the corresponding Portal


Teuwen, Philippe

How to Make Smartcards Resistant to Hackers' Lightsabers?

pdf-format:
Document 1.pdf (141 KB)


Abstract

Cracking smartcards has always been a prized hobby, for the academic glory , for fun (ha, breaking the self-claimed unbreakable...) and for profit (ask the mafia). State-of-the-art techniques include laser blasts that inject various transient or permanent faults in a program execution, potentially making the smartcard do whatever the attacker wants. After a brief recap of the attack tools and their effects, we'll see how the programmer can protect his code with software techniques ranging from cookbook recipes to tool chain automation and how he can evaluate the robustness of his code by means of fault injection simulators.

BibTeX - Entry

@InProceedings{teuwen:DSP:2010:2401,
  author =	{Philippe Teuwen},
  title =	{How to Make Smartcards Resistant to Hackers' Lightsabers?},
  booktitle =	{Foundations for Forgery-Resilient Cryptographic Hardware},
  year =	{2010},
  editor =	{Jorge Guajardo and Bart Preneel and Ahmad-Reza Sadeghi and Pim Tuyls},
  number =	{09282},
  series =	{Dagstuhl Seminar Proceedings},
  ISSN =	{1862-4405},
  publisher =	{Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany},
  address =	{Dagstuhl, Germany},
  URL =		{http://drops.dagstuhl.de/opus/volltexte/2010/2401},
  annote =	{Keywords: Fault-injection, smartcard, simulator}
}

Keywords: Fault-injection, smartcard, simulator
Seminar: 09282 - Foundations for Forgery-Resilient Cryptographic Hardware
Issue Date: 2010
Date of publication: 13.01.2010


DROPS-Home | Fulltext Search | Imprint Published by LZI