Advanced search
1 file | 322.53 KB Add to list

Mitigating smart card fault injection with link-time code rewriting: a feasibility study

Author
Organization
Abstract
We present a feasibility study to protect smart card software against fault-injection attacks by means of binary code rewriting. We implemented a range of protection techniques in a link-time rewriter and evaluate and discuss the obtained coverage, the associated overhead and engineering effort, as well as its practical usability.
Keywords
fault injection, smart card, software protection, binary rewriting

Downloads

  • paper.pdf
    • full text
    • |
    • open access
    • |
    • PDF
    • |
    • 322.53 KB

Citation

Please use this url to cite or link to this publication:

MLA
Maebe, Jonas et al. “Mitigating Smart Card Fault Injection with Link-time Code Rewriting: a Feasibility Study.” Lecture Notes in Computer Science. Ed. A-R Sadeghi. Vol. 7859. Heidelberg, Germany: Springer, 2013. 221–229. Print.
APA
Maebe, J., De Keulenaer, R., De Sutter, B., & De Bosschere, K. (2013). Mitigating smart card fault injection with link-time code rewriting: a feasibility study. In A.-R. Sadeghi (Ed.), LECTURE NOTES IN COMPUTER SCIENCE (Vol. 7859, pp. 221–229). Presented at the Financial Cryptography and Data Security 2013, Heidelberg, Germany: Springer.
Chicago author-date
Maebe, Jonas, Ronald De Keulenaer, Bjorn De Sutter, and Koen De Bosschere. 2013. “Mitigating Smart Card Fault Injection with Link-time Code Rewriting: a Feasibility Study.” In Lecture Notes in Computer Science, ed. A-R Sadeghi, 7859:221–229. Heidelberg, Germany: Springer.
Chicago author-date (all authors)
Maebe, Jonas, Ronald De Keulenaer, Bjorn De Sutter, and Koen De Bosschere. 2013. “Mitigating Smart Card Fault Injection with Link-time Code Rewriting: a Feasibility Study.” In Lecture Notes in Computer Science, ed. A-R Sadeghi, 7859:221–229. Heidelberg, Germany: Springer.
Vancouver
1.
Maebe J, De Keulenaer R, De Sutter B, De Bosschere K. Mitigating smart card fault injection with link-time code rewriting: a feasibility study. In: Sadeghi A-R, editor. LECTURE NOTES IN COMPUTER SCIENCE. Heidelberg, Germany: Springer; 2013. p. 221–9.
IEEE
[1]
J. Maebe, R. De Keulenaer, B. De Sutter, and K. De Bosschere, “Mitigating smart card fault injection with link-time code rewriting: a feasibility study,” in LECTURE NOTES IN COMPUTER SCIENCE, Bankoku Shinryokan, Japan, 2013, vol. 7859, pp. 221–229.
@inproceedings{4110409,
  abstract     = {{We present a feasibility study to protect smart card software against fault-injection attacks by means of binary code rewriting. We implemented a range of protection techniques in a link-time rewriter and evaluate and discuss the obtained coverage, the associated overhead and engineering effort, as well as its practical usability.}},
  author       = {{Maebe, Jonas and De Keulenaer, Ronald and De Sutter, Bjorn and De Bosschere, Koen}},
  booktitle    = {{LECTURE NOTES IN COMPUTER SCIENCE}},
  editor       = {{Sadeghi, A-R}},
  isbn         = {{9783642398834}},
  keywords     = {{fault injection,smart card,software protection,binary rewriting}},
  language     = {{eng}},
  location     = {{Bankoku Shinryokan, Japan}},
  pages        = {{221--229}},
  publisher    = {{Springer}},
  title        = {{Mitigating smart card fault injection with link-time code rewriting: a feasibility study}},
  url          = {{http://fc13.ifca.ai/proc/7-2.pdf}},
  volume       = {{7859}},
  year         = {{2013}},
}