Tampering with Java Card exceptions: The exception proves the rule

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Many publications have studied the various issues concerning Java Cards security regarding software and/or hardware attacks. However, it is surprising to notice that the particular case of exception-related mechanisms has not been tackled yet in the literature. In this article, we fill this gap by proposing several attacks against Java Card platforms based on both exception handling and exception throwing. In addition, this study allows us to point out that a weakness known by the web-oriented Java community for more than a decade still passes the different steps of the state-of-the-art Java Card application deployment process (namely conversion and verification). This appears all the more important as the Java Card 3 Connected Edition specifications have started to bridge the gap between the two worlds that are Java Cards and Java web services.

Original languageEnglish
Title of host publicationSECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography
Pages55-63
Number of pages9
Publication statusPublished - 24 Oct 2012
Externally publishedYes
EventInternational Conference on Security and Cryptography, SECRYPT 2012 - Rome, Italy
Duration: 24 Jul 201227 Jul 2012

Publication series

NameSECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography

Conference

ConferenceInternational Conference on Security and Cryptography, SECRYPT 2012
Country/TerritoryItaly
CityRome
Period24/07/1227/07/12

Keywords

  • Combined attacks
  • Fault attacks
  • Java card
  • Java exceptions
  • Software attacks

Fingerprint

Dive into the research topics of 'Tampering with Java Card exceptions: The exception proves the rule'. Together they form a unique fingerprint.

Cite this