How to Make Smartcards Resistant to Hackers' Lightsabers?

Author Philippe Teuwen



PDF
Thumbnail PDF

File

DagSemProc.09282.6.pdf
  • Filesize: 140 kB
  • 8 pages

Document Identifiers

Author Details

Philippe Teuwen

Cite AsGet BibTex

Philippe Teuwen. How to Make Smartcards Resistant to Hackers' Lightsabers?. In Foundations for Forgery-Resilient Cryptographic Hardware. Dagstuhl Seminar Proceedings, Volume 9282, pp. 1-8, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)
https://doi.org/10.4230/DagSemProc.09282.6

Abstract

Cracking smartcards has always been a prized hobby, for the academic glory , for fun (ha, breaking the self-claimed unbreakable...) and for profit (ask the mafia). State-of-the-art techniques include laser blasts that inject various transient or permanent faults in a program execution, potentially making the smartcard do whatever the attacker wants. After a brief recap of the attack tools and their effects, we'll see how the programmer can protect his code with software techniques ranging from cookbook recipes to tool chain automation and how he can evaluate the robustness of his code by means of fault injection simulators.
Keywords
  • Fault-injection
  • smartcard
  • simulator

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail