期刊文献+

Java卡安全性研究

Research on Java card security
下载PDF
导出
摘要 为了保护个人隐私以及财产的安全性,提出了Java卡安全性研究。在系统论述Java卡基本组成结构的基础上,对逻辑攻击、故障注入、联合攻击等攻击方式的研究工作进行了总结,探讨了其中存在的一些问题,进一步对各种攻击方式提出了相应的防御措施并分析其存在的不足。最后对未来的研究方向进行了展望。 To protect privacy and the safety of property, the security research of Java card was proposed. On the basis of systematically discussing the basic composition of Java card, the key of attacking methods were summarized, including logical attack, fault injection and combined attack. At the same time, some problems with the attack process were presented. Moreover, some corresponding countermeasures were put forward and their shortages were analyzed. Finally, the future research direction was prospected.
出处 《网络与信息安全学报》 2017年第6期58-64,共7页 Chinese Journal of Network and Information Security
基金 国家重大科技专项基金资助项目(No.2014ZX01032401-001) 国家高技术研究发展计划("863"计划)基金资助项目(No.2012AA01A403) "十二五"国家密码发展基金资助项目(No.MMJJ201101022) 四川省科技计划项目基金资助项目(No.2017GZ0313) 四川省教育厅科研基金资助项目(No.17ZB0082)~~
关键词 JAVA卡 逻辑攻击 故障注入 联合攻击 防御措施 Java card logical attack fault injection combined attack countermeasure
  • 相关文献

参考文献1

二级参考文献10

  • 1Sun Microsystems,Inc.Runtime Environment Specification Java CardTM Platform,Version 3.0.1 Connected Edition. . 2009
  • 2Sun Microsystems,Inc.Virtual Machine Specification JavaCardTM Platform,Version 3.0.1 Connected Edition. . 2009
  • 3Bauduin R.Fault Attacks,an Intuitive Approach. Fault Diagnosis and Tolerance in Cryptography (FDTC’’06) . 2006
  • 4Giraud C,Thiebeauld H.A Survey on Fault Attacks. Smart Card Research and Advanced Application Conference (CARDIS’’04) . 2004
  • 5Mostowski W,Poll E.Malicious Code on Java Card Smartcards:Attacks and Countermeasures. Smart Card Research and Advanced Application Conference (CARDIS’’08) . 2008
  • 6Common Criteria:Application of Attack Potential to Smartcards-Version 2. 7. .
  • 7Smart Secure Devices (SSD)Team-XLIM.Universitéde Limoges:The CAP file manipulator. http://secinfo.msi.unilim.fr/ .
  • 8Barbu G,Thiebeauld H,Guerin V.Attacks on Java Card 3.0Combining Fault and Logical Attacks. Smart Card Research and Advanced Application . 2010
  • 9Vermoen D,Witteman M,Gaydadjiev G.Reverse Engineering Java Card Applets Using Power Analysis. Information Security Theory and Practice (WISTP’’07) . 2007
  • 10Barbu G,Thiebeauld H.Synchronized Attacks on Multithreaded Systems-application to Java Card 3.0. Smart Card Research and Advanced Applications . 2011

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部