Security automaton to mitigate laser-based fault attacks on smart cards
Texte intégral
Documents relatifs
Security of the main CPU against Cache Timing Attacks: The chapter 10 studies the applicability of Bernstein’s time-driven cache attack [Ber05] on real mobile devices.. We
A Generic Approach for Protecting Java Card™ Smart Card Against Software Attacks Thèse dirigée par le Professeur Jean-Louis LANET JURY : Rapporteurs : M.. David NACCACHE,
Our reputation-based coalition game differs from the aforementioned approaches by (1) Designing a coalition formation algorithm, (2) Maintaining the coalition via a
To succeed in executing an arbitrary shellcode we have to load inside the card an ill-typed applet that must transfer the control flow to the shellcode and must pass through the BCV
This paper presents a formal model of the smart card Web server specification and the proof of its security properties.. The for- malization enables a thoughtful analysis of
recently proposed a lightweight RFID mutual authentication protocol [11], based on chaotic maps [33] where the enhanced Chebyshev polynomials have been utilized.. Benssalah
It is found that this scheme has following weak spots: (i) vulnerable to impersonation attack, (ii) no early wrong password detection, (iii) no mutual authentication and (iv) no
Note that the server and client side representations of the page being compared are different: the server source code is free of any injected malicious code, while the input