期刊文献+

基于混合攻击的Java卡3.0安全性研究 被引量:2

Security Study on Java Card 3.0 based on Hybrid Attack
原文传递
导出
摘要 Java卡3.0平台相较于2.x平台有巨大革新,尤其是其连接版,支持多线程、动态类加载、Web应用和垃圾回收机制等。但在带来更强大功能的同时,新特性也为攻击者提供更广的攻击面。文中将针对Java卡3.0平台,结合故障注入和逻辑篡改进行攻击以伪造引用,并以此分析研究其连接版新特性带来的安全隐患,最后将提出相应对策。 Compared with 2.x,Java card 3.0 experiences significant breakthroughs,particularly in its connected edition. This latest release offers myriads of new features such as multithreading,dynamic loading,web services,garbage collection and so on,and these al-so provide even broader attack dimension as well as advanced functionality. Aiming at Java card 3.0,attacks combined with fault injec-tion and logical tampering are fabricated and conducted. By so doing,the corresponding countermeasures are proposed,and the compre-hensive consideration of new threats brought by Java card 3.0 features.
作者 于晖
机构地区 上海交通大学
出处 《信息安全与通信保密》 2014年第9期125-128,共4页 Information Security and Communications Privacy
关键词 Java卡3.0 混合攻击 故障注入 逻辑攻击 Java card 3.0 combined attack fault injection logical attack
  • 相关文献

参考文献10

  • 1Sun Microsystems,Inc.Runtime Environment Specification Java CardTM Platform,Version 3.0.1 Connected Edition. . 2009
  • 2Sun Microsystems,Inc.Virtual Machine Specification JavaCardTM Platform,Version 3.0.1 Connected Edition. . 2009
  • 3Bauduin R.Fault Attacks,an Intuitive Approach. Fault Diagnosis and Tolerance in Cryptography (FDTC’’06) . 2006
  • 4Giraud C,Thiebeauld H.A Survey on Fault Attacks. Smart Card Research and Advanced Application Conference (CARDIS’’04) . 2004
  • 5Mostowski W,Poll E.Malicious Code on Java Card Smartcards:Attacks and Countermeasures. Smart Card Research and Advanced Application Conference (CARDIS’’08) . 2008
  • 6Common Criteria:Application of Attack Potential to Smartcards-Version 2. 7. .
  • 7Smart Secure Devices (SSD)Team-XLIM.Universitéde Limoges:The CAP file manipulator. http://secinfo.msi.unilim.fr/ .
  • 8Barbu G,Thiebeauld H,Guerin V.Attacks on Java Card 3.0Combining Fault and Logical Attacks. Smart Card Research and Advanced Application . 2010
  • 9Vermoen D,Witteman M,Gaydadjiev G.Reverse Engineering Java Card Applets Using Power Analysis. Information Security Theory and Practice (WISTP’’07) . 2007
  • 10Barbu G,Thiebeauld H.Synchronized Attacks on Multithreaded Systems-application to Java Card 3.0. Smart Card Research and Advanced Applications . 2011

同被引文献4

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部