Application-replay attack on Java cards: When the garbage collector gets confused

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Java Card 3.0 specifications have brought many new features in the Java Card world, amongst which a true garbage collection mechanism. In this paper, we show how one could use this specific feature to predict the references that will be assigned to object instances to be created. We also exploit this reference prediction process in a combined attack. This attack stands as a kind of "application replay" attack, taking advantage of an unspecified behavior of the Java Card Runtime Environment (JCRE) on application instance deletion. It reveals quite powerful, since it potentially permits the attacker to circumvent the application firewall: a fundamental and historical Java Card security mechanism. Finally, we point out that this breach comes from the latest specification update and more precisely from the introduction of the automatic garbage collection mechanism, which leads to a straightforward countermeasure to the exposed attack.

Original languageEnglish
Title of host publicationEngineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Proceedings
Pages1-13
Number of pages13
DOIs
Publication statusPublished - 27 Feb 2012
Externally publishedYes
Event4th International Symposium on Engineering Secure Software and Systems, ESSoS 2012 - Eindhoven, Netherlands
Duration: 16 Feb 201217 Feb 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7159 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th International Symposium on Engineering Secure Software and Systems, ESSoS 2012
Country/TerritoryNetherlands
CityEindhoven
Period16/02/1217/02/12

Keywords

  • Application Firewall
  • Combined Attack
  • Garbage Collection
  • Java Card

Fingerprint

Dive into the research topics of 'Application-replay attack on Java cards: When the garbage collector gets confused'. Together they form a unique fingerprint.

Cite this