Cartes à puce : Attaques et contremesures.

We present in this article our research dealing with faults attacks and logical attacks on smart cards, especially on Java Card. We introduce by presenting Java Card and its security mechanisms, then we present the types of attacks carried out on smart cards and we present some countermeasures for these attacks and in particular those faults attacks. And we finish with the presentation of our work on the tool of manipulation of a file format of Java Card and other proposals for countermeasures on faults attacks.

[1]  Francis Olivier,et al.  Electromagnetic Analysis: Concrete Results , 2001, CHES.

[2]  Z. Chen Java Card Technology for Smart Cards: Architecture and Programmer''s Guide. The Java Series. Addis , 2000 .

[3]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[4]  James A. Muir,et al.  Techniques of Side Channel Cryptanalysis , 2001 .

[5]  David Naccache,et al.  The Sorcerer's Apprentice Guide to Fault Attacks , 2006, Proceedings of the IEEE.

[6]  Uwe Hansmann,et al.  Smart Card Application Development Using Java , 2002, Springer Berlin Heidelberg.

[7]  Neil Walkinshaw,et al.  The Java system dependence graph , 2003, Proceedings Third IEEE International Workshop on Source Code Analysis and Manipulation.

[8]  Louis Goubin,et al.  Automatic Integration of Counter-Measures Against Fault Injection Attacks , 2003 .

[9]  Ross J. Anderson,et al.  Optical Fault Induction Attacks , 2002, CHES.

[10]  Andrew W. Appel,et al.  Using memory errors to attack a virtual machine , 2003, 2003 Symposium on Security and Privacy, 2003..

[11]  Jean-Jacques Quisquater,et al.  ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.

[12]  Jean-Louis Lanet,et al.  New security issues raised by open cards , 1999, Inf. Secur. Tech. Rep..

[13]  M. Kuhn,et al.  The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .

[14]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[15]  Edward J. McCluskey,et al.  Control-flow checking by software signatures , 2002, IEEE Trans. Reliab..

[16]  Martín Abadi,et al.  Control-flow integrity , 2005, CCS '05.

[17]  Christophe Giraud,et al.  A Survey on Fault Attacks , 2004, CARDIS.