Reference Hub3
Mitigating Type Confusion on Java Card

Mitigating Type Confusion on Java Card

Jean Dubreuil, Guillaume Bouffard, Bhagyalekshmy N. Thampi, Jean-Louis Lanet
Copyright: © 2013 |Volume: 4 |Issue: 2 |Pages: 21
ISSN: 1947-3036|EISSN: 1947-3044|EISBN13: 9781466632509|DOI: 10.4018/jsse.2013040102
Cite Article Cite Article

MLA

Dubreuil, Jean, et al. "Mitigating Type Confusion on Java Card." IJSSE vol.4, no.2 2013: pp.19-39. http://doi.org/10.4018/jsse.2013040102

APA

Dubreuil, J., Bouffard, G., Thampi, B. N., & Lanet, J. (2013). Mitigating Type Confusion on Java Card. International Journal of Secure Software Engineering (IJSSE), 4(2), 19-39. http://doi.org/10.4018/jsse.2013040102

Chicago

Dubreuil, Jean, et al. "Mitigating Type Confusion on Java Card," International Journal of Secure Software Engineering (IJSSE) 4, no.2: 19-39. http://doi.org/10.4018/jsse.2013040102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

One of the challenges for smart card deployment is the security interoperability. A smart card resistant to an attack on a given platform should be able to guarantee the same behavior on another platform. But the current implementations do not comply with this requirement. In order to improve such standardization the authors propose a framework based on annotations with an external pre-processing to switch the Java Card Virtual Machine (JCVM) into a secure mode by activating a set of countermeasures. An example has been proposed in this paper for implementing a countermeasure against type confusion with a fault attack. Smart cards are often the target of software, hardware or combined attacks. In recent days most of the attacks are based on fault injection which can modify the behavior of applications loaded onto the card, changing them into mutant applications. This countermeasure requires a transformation of the original program byte codes which remain semantically equivalent. It needs a modification of the JCVM which stays backward compatible and a dedicated framework to deploy these applications. Thus, the proposed platform can resist to a fault enabled mutant.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.