Security automaton to mitigate laser-based fault attacks on smart cards

  title={Security automaton to mitigate laser-based fault attacks on smart cards},
  author={Guillaume Bouffard and Bhagyalekshmy N. Thampi and Jean-Louis Lanet},
  journal={Int. J. Trust. Manag. Comput. Commun.},
Security and attacks are two sides of the same coin in the smart card industry. Smart cards are prone to different types of attacks to gain access to the assets stored in it and that can cause security issues. It is necessary to identify and exploit these attacks and implement appropriate countermeasures to mitigate their effects. Fault attacks are one among them. They can introduce abnormal behaviour on the smart card environment. The redundancy is necessary to detect this change in their… 

Figures and Tables from this paper

A Generic Approach for Protecting Java Card™ Smart Card Against Software Attacks

By modelling the conditions, this thesis discovered new attack paths to get access to the smart card contents and introduced new countermeasures to mitigate the undesirable events defined in the tree models.

Hardening a Java Card Virtual Machine Implementation with the MPU

How the Memory Protection Unit (MPU) can be used to segregate each Java Card applet from the Operating System (OS) and device drivers is described.



Detecting Laser Fault Injection for Smart Cards Using Security Automata

This paper proposes an automatic method to provide redundancy using a security automaton as the main detection mechanism that can enforce some trace properties on a smart card application, by using the combination of a static analysis and a dynamic monitoring.

A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks

A powerful attack based on the vulnerability of the linker which could change the correct byte code into malicious one is discussed and a countermeasure which scrambles the instructions of the method byte code with the Java Card Program Counter is proposed.

Dynamic Fault Injection Countermeasure - A New Conception of Java Card Security

A new pragmatic approach to counteract Fault Injection is introduced by dynamically increasing the security level of the application by upgrading the Java Card Virtual Machine, allowing to optimize the performance of sensitive applications in every day life while providing a strong security level as soon as an attacker tries to disturb their executions.

Mitigating Type Confusion on Java Card

A framework based on annotations with an external pre-processing to switch the Java Card Virtual Machine (JCVM) into a secure mode by activating a set of countermeasures against type confusion with a fault attack is proposed.

Combined Software and Hardware Attacks on the Java Card Control Flow

Two attacks to modify the Java Card control flow and to execute the authors' own malicious byte code are described with the help of a laser beam.

Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures

This article describes concrete results and practically validated countermeasures concerning differential fault attacks on RSA using the CRT, and is convinced that only sophisticated hardware countermeasures in combination with software countermeasures will be able to provide security.

Optical Fault Induction Attacks

A technology to block a new class of attacks on secure microcontrollers and smartcards whereby a logical 1 or 0 is not encoded by a high or low voltage on a single line, but by (HL or (LH) on a pair of lines.

A new CRT-RSA algorithm secure against bellcore attacks

This paper describes a new algorithm to prevent fault attacks on RSA signature algorithms using the Chinese Remainder Theorem (CRT-RSA), and proves that the new algorithm is secure against the Bellcore attack.

Smart Card Research and Advanced Applications

This paper fabricates and evaluates 39 PTRNGs using RS latches using RS Latches on 0.18μm ASICs, and confirms that the P TRNGs have high-robustness against environmental stress.

Attacks on Java Card 3.0 Combining Fault and Logical Attacks

It is demonstrated that running ill-formed application does not necessarily mean loading and installing ill- formed application and a brand new kind of attack which combines fault injection and logical tampering is introduced which leads to the modification of any method already installed on the card into any malicious bytecode.