Design principles for tamper-resistant smartcard processors

被引:0
|
作者
Kömmerling, O [1 ]
Kuhn, MG [1 ]
机构
[1] Adv Digital Secur Res, D-66484 Riedelberg, Germany
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We describe techniques for extracting protected software and data from smartcard processors. This includes manual microprobing, laser cutting, focused ion-beam manipulation, glitch attacks, and power analysis. Many of these methods have already been used to compromise widely-fielded conditional-access systems, and current smartcards offer little protection against them. We give examples of low-cost protection concepts that make such attacks considerably more difficult.
引用
收藏
页码:9 / 20
页数:12
相关论文
共 50 条
  • [31] Tamper-Resistant Mobile Health Using Blockchain Technology
    Ichikawa, Daisuke
    Kashiyama, Makiko
    Ueno, Taro
    [J]. JMIR MHEALTH AND UHEALTH, 2017, 5 (07):
  • [32] A Tamper-Resistant Algorithm Using Blockchain for the Digital Tachograph
    Kim, Yongbae
    Back, Juyong
    Kim, Jongweon
    [J]. ELECTRONICS, 2021, 10 (05) : 1 - 19
  • [34] StreamTo: Streaming content using a tamper-resistant token
    Cheng, JY
    Chong, CN
    Doumen, JM
    Etalle, S
    Hartel, PH
    Nikolaus, S
    [J]. SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 2005, 181 : 601 - 612
  • [35] FDA approves a more tamper-resistant formulation of OxyContin
    不详
    [J]. FORMULARY, 2010, 45 (05) : 166 - 167
  • [36] Tamper-Resistant Opioid Formulations in the Treatment of Acute Pain
    Steven D. Passik
    [J]. Advances in Therapy, 2014, 31 : 264 - 275
  • [37] Tamper-Resistant Corpus Retrieval Using Perceptual Hashing
    Hu, Die
    Hu, Weili
    [J]. TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2024, 31 (04): : 1223 - 1231
  • [38] Tamper-resistant drugs cannot solve the opioid crisis
    Leece, Pamela
    Orkin, Aaron M.
    Kahan, Meldon
    [J]. CANADIAN MEDICAL ASSOCIATION JOURNAL, 2015, 187 (10) : 717 - 718
  • [39] Tamper-Resistant Opioid Formulations in the Treatment of Acute Pain
    Passik, Steven D.
    [J]. ADVANCES IN THERAPY, 2014, 31 (03) : 264 - 275
  • [40] An approach to the objective and quantitative evaluation of tamper-resistant software
    Goto, H
    Mambo, M
    Matsumura, K
    Shizuya, H
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2001, 1975 : 82 - 96