期刊文献+

Java智能卡的安全漏洞分析与防御

Analysis and Defense of Security Breaches of Java Smart Card
下载PDF
导出
摘要 智能卡由于自身较高的安全特性和易携带等优点,使其成为人们生活中被广泛使用的工具。Java智能卡凭借技术优势更是受到社会青睐。智能卡通常携带个人私密信息和重要数据,使之受到来自多方面的威胁。对Java智能卡的安全研究有助于提高卡内虚拟机的安全性。本文详细阐述JCVM(Java Card Virtual Machine)存在的安全漏洞,给出实际的病毒代码,深入分析并找出漏洞存在的根本原因,在研究学习前人的基础之上并结合实际给出对应的防御措施。 Smart cards because of its own higher security characteristic and advantage of easy to carry,etc,make it become the widely use tool in our live.Java smart card relies on its technology advantage but also favored by society.The personal confidential information and important data which smart cards usually carrying make it suffer some threads come from various aspects.For the study of the security of Java smart card help to improve the safety of the virtual machine inside card.The paper expounds the existing JCVM security vulnerabilities,presents the practical virus codes,with the thorough analysis and finds out the root cause of the vulnerabilities existing,in the study on the basis of predecessors and actually gives the corresponding defense measures.
出处 《计算机与现代化》 2012年第10期99-101,124,共4页 Computer and Modernization
关键词 逻辑攻击 类型迷惑 对象重构 JCVM logical attacks type confusion object reconstruction JCVM
  • 相关文献

参考文献14

  • 1Sun Microsystems, Inc. Virtual Machine Specification Java Card Platform, Version 2.2. I[Z]. 2003.
  • 2Guillaume Bouffard, Jean-Louis I_anet. The next smart card nightmare logical attacks, combined attacks, mutant appli- cations and other funny things[ C ]//LNCS. 2012:405-424.
  • 3Sun Microsystems, Inc. Runtime Environment Specification Java CardTM Platform, Version 2.2.1 [ Z]. 2003.
  • 4Wojciech Mostowski, Erik Poll. Malicious code on Java card smartcards : Attacks and countermeasures [ C ]//Pro- ceedings of the 8th IFIP WG 8.8/11.2 International Con- ference on Smart Card Research and Advanced Applica- tions. 2008 : 1-16.
  • 5Beckert B, Mostowski W. A program logic for handling Ja- va card' s transaction mechanism [ C ]//Proceedings of the 6th International Conference on Fundamental Approaches to Software Engineering. 2003: 246-260.
  • 6Marche C, Rousset, N. Verification of Java card applets behavior with respect to transactions and card tears [ C ]// Proceedings of the Fourth IEEE International Conference on Software En-neering and Formal Methods. 2006 : 137-146.
  • 7Hubbers E, Mostowski W, Poll E. Tearing Java cards [ C]//Proceedings, E-Smart. 2006:20-22.
  • 8Ahmadou A1 Khary S-r6, Jltlien Iguchi-Cartigny, Jean-Louis Lanet. Checking the paths to identify mutant application on embedded systems[ C]//LNCS. 2010:459-468.
  • 9Guillaume Barbu, Guillaume Due, Philippe Hoogvorst. Ja-va card operand stack : Fault attacks, combined attacks and countermeasures [ C ]//LNCS. 2011 : 297-313.
  • 10Guillaume Barbu, Philippe Hoogvorst, Guillaume Duc. Application-replay attack on Java eards: When the garbagecollector gets confused[ C]//LNCS. 2012 : 1-13.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部