You are here:
Publication details
Improving Resiliency of JavaCard Code Against Power Analysis
Authors | |
---|---|
Year of publication | 2009 |
Type | Article in Proceedings |
Conference | Santa's Crypto Get-Together 2009 |
MU Faculty or unit | |
Citation | |
Field | Informatics |
Keywords | JavaCard; Power Analysis; Bytecode; Reverse Engineering; Security |
Description | The power analysis of smart cards is powerful side channel attack, originally introduced by Kocher et al. The observation of power consumption of smart card with high precision can be used to extract information about executed code as well as about the processed data. Our work describes ways how to obtain information about bytecode instruction from power trace, identify vulnerable operations leaking information about its operand and propose general framework for automatic replacement of vulnerable operations by safe equivalents. Practical implementation and examples of usage is presented and discussed. |
Related projects: |