The Hell Forgery, Polymorphic Codes Shoot Again

We present in this paper a new approach to gain access to assets of a smart card. It is based on the concept of reference forgery and array extension. We characterize the meta data of the system using different level of expertize from human know-hows to formal methods. We are able to generate arbitrary but well formed references which allow us to execute self modifying Java program inside the card. This hostile program is able to dump the complete Non Volatile Memory (NVM) memory segment. Then we develop a graphical representation of the objects belonging to the system for gaining abstraction of the binary dump.