High Level Model of Control Flow Attacks for Smart Card Functional Security

被引:10
|
作者
Berthome, P. [1 ]
Heydemann, K. [2 ]
Kauffmann-Tourkestansky, X. [1 ,3 ]
Lalande, J. -F. [1 ]
机构
[1] Ensi Bourges, LIFO, F-18000 Bourges, France
[2] Univ Paris 06, LIP6, F-75005 Paris, France
[3] Oberthur Technol, F-92726 Nanterre, France
关键词
smart card; physical attacks; security; tests;
D O I
10.1109/ARES.2012.79
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Smart card software has to implement software countermeasures to face attacks. Some of these attacks are physical disruptions of chip components that cause a misbehavior in the code execution. A successful functional attack may reveal a secret or grant an undesired authorization. In this paper, we propose to model fault attacks at source level and then simulate these attacks to find out which ones are harmful. After discussing the effects of physical attacks at assembly level and going back to their consequences at source code level, the paper focuses on control flow attacks. Such attacks are good candidates for the proposed model that can be used to exhaustively test the robustness of the attacked program. On the bzip2 software, the paper's results show that up to 21% of the assembly simulated control flow attacks are covered by the C model with 30 times less test cases.
引用
收藏
页码:224 / 229
页数:6
相关论文
共 50 条
  • [1] A study on smart card security evaluation criteria for side channel attacks
    Lee, H
    Ahn, M
    Lim, S
    Moon, S
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 517 - 526
  • [2] Examining smart-card security under the threat of power analysis attacks
    Messerges, TS
    Dabbish, EA
    Sloan, RH
    IEEE TRANSACTIONS ON COMPUTERS, 2002, 51 (05) : 541 - 552
  • [3] Smart-card microcomputers for high-security applications
    Hitachi Review, 2001, (SPECIAL ISSUE):
  • [4] Combined software and hardware attacks on the java card control flow
    Bouffard, Guillaume
    Iguchi-Cartigny, Julien
    Lanet, Jean-Louis
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, 7079 : 283 - 296
  • [5] Control systems, smart sensors, controller, elements in a control loop, Java Card and Security
    Communication Sciences and Technologies SEE University, SEE University, Ilindenska bb. CST, Office 305.12, 305.01, 1200, Tetovo, Macedonia
    WSEAS Trans. Syst. Control, 2008, 5 (365-374):
  • [6] SMARTCOP -: A smart card based access control for the protection of network security components
    Garcia-Alfaro, Joaquin
    Castillo, Sergio
    Castella-Roca, Jordi
    Navarro, Guillermo
    Borrell, Joan
    On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, Pt 1, Proceedings, 2006, 4277 : 415 - 424
  • [7] A formal security model of the Infineon SLE 88 smart card memory management
    von Oheimb, D
    Walter, G
    Lotz, V
    COMPUTER SECURITY - ESORICS 2003, PROCEEDINGS, 2003, 2808 : 217 - 234
  • [8] Design of Multi-Service Smart Card Systems for High Security and Performance
    Hong, Mei
    Guo, Hui
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (01): : 87 - 100
  • [9] Software Countermeasures for Control Flow Integrity of Smart Card C Codes
    Lalande, Jean-Francois
    Heydemann, Karine
    Berthome, Pascal
    COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 200 - 218
  • [10] The ultimate control flow transfer in a Java']Java based smart card
    Bouffard, Guillaume
    Lanet, Jean-Louis
    COMPUTERS & SECURITY, 2015, 50 : 33 - 46