skip to main content
10.1145/1631716.1631723acmconferencesArticle/Chapter ViewAbstractPublication PagesesweekConference Proceedingsconference-collections
research-article

Automatic detection of fault attack and countermeasures

Published: 15 October 2009 Publication History

Abstract

Security of smart cards is continuously threatened by many software and hardware attacks. Those attacks focus on giving secret information that are stored in the card like PIN code, secret cryptographic keys, or on granting access to some restricted operations. The main line of this paper is to integrate countermeasure against fault attacks into a Java Card 3.x smart card. So the solutions proposed, allow to transform some annotations that are put by the developer, in information which will guide the code interpreter to detect faults that can occur during programs execution. the proposals are generic in sense that they don't focus on a particular algorithm. Fault Attack, java Card, bytecode, opcode, basic block

References

[1]
M. Akkar, L. Goubin, and O. Ly. Automatic Integration of Counter-Measures Against Fault Injection Attacks. Pre-print found at http://www.labri.fr/Perso/ly/index.htm, 2003.
[2]
R. Anderson and M. Kuhn. Low cost attacks on tamper resistant devices. Lecture notes in computer science, pages 125--136, 1998.
[3]
C. Aumuller, P. Bier, W. Fischer, P. Hofreiter, and J. Seifert. Fault attacks on RSA with CRT: Concrete results and practical countermeasures. Lecture Notes in Computer Science, pages 260--275, 2003.
[4]
H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, C. Whelan, D. Ltd, and I. Rehovot. The sorcerer's apprentice guide to fault attacks. Proceedings of the IEEE, 94(2):370--382, 2006.
[5]
E. Biham and A. Shamir. Differential fault analysis of secret key cryptosystems. Lecture Notes in Computer Science, 1294:513--525, 1997.
[6]
J. Blomer, M. Otto, and J. Seifert. A new CRT-RSA algorithm secure against Bellcore attacks. In Proceedings of the 10th ACM conference on Computer and communications security, pages 311--320. ACM New York, NY, USA, 2003.
[7]
D. Boneh, R. DeMillo, and R. Lipton. On the importance of checking cryptographic protocols for faults. Lecture Notes in Computer Science, 1233:37--51, 1997.
[8]
K. Gadellaa. Fault Attacks on Java Card (Masters Thesis). Universidade de Eindhoven, 2005.
[9]
O. Kommerling, M. Kuhn, and P. Street. Design principles for tamper-resistant smartcard processors.
[10]
J. Quisquater and D. Samyde. Eddy current for magnetic analysis with active sensor. In Proceedings of Esmart, volume 2002, 2002.
[11]
S. Skorobogatov and R. Anderson. Optical fault induction attacks. Lecture notes in computer science, pages 2--12, 2003.
[12]
D. Wagner. Cryptanalysis of a provably secure CRT-RSA algorithm. In Proceedings of the 11th ACM conference on Computer and communications security, pages 92--97. ACM New York, NY, USA, 2004.

Cited By

View all
  • (2024)An Engineered Minimal-Set Stimulus for Periodic Information Leakage Fault Detection on a RISC-V MicroprocessorCryptography10.3390/cryptography80200168:2(16)Online publication date: 22-Apr-2024
  • (2017)Machine learning techniques to predict sensitive patterns to fault attack in the Java Card applicationJournal of Experimental & Theoretical Artificial Intelligence10.1080/0952813X.2017.140927630:1(101-127)Online publication date: 15-Dec-2017
  • (2016)Automatic security enhancement of crypto ICs against fault injection attacks2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)10.1109/ICASID.2016.7873887(11-15)Online publication date: Sep-2016
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WESS '09: Proceedings of the 4th Workshop on Embedded Systems Security
October 2009
79 pages
ISBN:9781605587004
DOI:10.1145/1631716
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 October 2009

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

ESWeek '09
ESWeek '09: Fifth Embedded Systems Week
October 15, 2009
Grenoble, France

Acceptance Rates

Overall Acceptance Rate 8 of 21 submissions, 38%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)1
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)An Engineered Minimal-Set Stimulus for Periodic Information Leakage Fault Detection on a RISC-V MicroprocessorCryptography10.3390/cryptography80200168:2(16)Online publication date: 22-Apr-2024
  • (2017)Machine learning techniques to predict sensitive patterns to fault attack in the Java Card applicationJournal of Experimental & Theoretical Artificial Intelligence10.1080/0952813X.2017.140927630:1(101-127)Online publication date: 15-Dec-2017
  • (2016)Automatic security enhancement of crypto ICs against fault injection attacks2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)10.1109/ICASID.2016.7873887(11-15)Online publication date: Sep-2016
  • (2016)Link-time smart card code hardeningInternational Journal of Information Security10.1007/s10207-015-0282-015:2(111-130)Online publication date: 1-Apr-2016
  • (2016)Secure and Trusted Application Execution on Embedded DevicesInnovative Security Solutions for Information Technology and Communications10.1007/978-3-319-27179-8_1(3-24)Online publication date: 15-Jan-2016
  • (2015)Enhancing Java Runtime Environment for Smart Cards Against Runtime AttacksComputer Security -- ESORICS 201510.1007/978-3-319-24177-7_27(541-560)Online publication date: 18-Nov-2015
  • (2015)Heap $$\ldots $$ Hop! Heap Is Also VulnerableSmart Card Research and Advanced Applications10.1007/978-3-319-16763-3_2(18-31)Online publication date: 17-Mar-2015
  • (2014)A Redundancy-Based Attack Detection Technique for Java Card BytecodeProceedings of the 2014 IEEE 23rd International WETICE Conference10.1109/WETICE.2014.60(384-389)Online publication date: 23-Jun-2014
  • (2014)New Countermeasures against Fault and Software Type Confusion Attacks on Java CardsProceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Securing the Internet of Things - Volume 850110.1007/978-3-662-43826-8_5(57-75)Online publication date: 2-Jul-2014
  • (2013)Mitigating Type Confusion on Java CardInternational Journal of Secure Software Engineering10.4018/jsse.20130401024:2(19-39)Online publication date: Apr-2013
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media