Advanced search
1 file | 569.57 KB Add to list

Link-time smart card code hardening

Author
Organization
Abstract
This paper presents a feasibility study to protect smart card software against fault-injection attacks by means of link-time code rewriting. This approach avoids the drawbacks of source code hardening, avoids the need for manual assembly writing, and is applicable in conjunction with closed third-party compilers. We implemented a range of cookbook code hardening recipes in a prototype link-time rewriter and evaluate their coverage and associated overhead to conclude that this approach is promising. We demonstrate that the overhead of using an automated link-time approach is not significantly higher than what can be obtained with compile-time hardening or with manual hardening of compiler-generated assembly code.
Keywords
SOFTWARE, DIVERSITY, Software protection, Binary rewriting, Smart card, Fault, Overhead

Downloads

  • link-time smart card code hardening.pdf
    • full text
    • |
    • open access
    • |
    • PDF
    • |
    • 569.57 KB

Citation

Please use this url to cite or link to this publication:

MLA
De Keulenaer, Ronald et al. “Link-time Smart Card Code Hardening.” INTERNATIONAL JOURNAL OF INFORMATION SECURITY 15.2 (2016): 111–130. Print.
APA
De Keulenaer, R., Maebe, J., De Bosschere, K., & De Sutter, B. (2016). Link-time smart card code hardening. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 15(2), 111–130.
Chicago author-date
De Keulenaer, Ronald, Jonas Maebe, Koen De Bosschere, and Bjorn De Sutter. 2016. “Link-time Smart Card Code Hardening.” International Journal of Information Security 15 (2): 111–130.
Chicago author-date (all authors)
De Keulenaer, Ronald, Jonas Maebe, Koen De Bosschere, and Bjorn De Sutter. 2016. “Link-time Smart Card Code Hardening.” International Journal of Information Security 15 (2): 111–130.
Vancouver
1.
De Keulenaer R, Maebe J, De Bosschere K, De Sutter B. Link-time smart card code hardening. INTERNATIONAL JOURNAL OF INFORMATION SECURITY. Springer Berlin Heidelberg; 2016;15(2):111–30.
IEEE
[1]
R. De Keulenaer, J. Maebe, K. De Bosschere, and B. De Sutter, “Link-time smart card code hardening,” INTERNATIONAL JOURNAL OF INFORMATION SECURITY, vol. 15, no. 2, pp. 111–130, 2016.
@article{6958527,
  abstract     = {{This paper presents a feasibility study to protect smart card software against fault-injection attacks by means of link-time code rewriting. This approach avoids the drawbacks of source code hardening, avoids the need for manual assembly writing, and is applicable in conjunction with closed third-party compilers. We implemented a range of cookbook code hardening recipes in a prototype link-time rewriter and evaluate their coverage and associated overhead to conclude that this approach is promising. We demonstrate that the overhead of using an automated link-time approach is not significantly higher than what can be obtained with compile-time hardening or with manual hardening of compiler-generated assembly code.}},
  author       = {{De Keulenaer, Ronald and Maebe, Jonas and De Bosschere, Koen and De Sutter, Bjorn}},
  issn         = {{1615-5262}},
  journal      = {{INTERNATIONAL JOURNAL OF INFORMATION SECURITY}},
  keywords     = {{SOFTWARE,DIVERSITY,Software protection,Binary rewriting,Smart card,Fault,Overhead}},
  language     = {{eng}},
  number       = {{2}},
  pages        = {{111--130}},
  publisher    = {{Springer Berlin Heidelberg}},
  title        = {{Link-time smart card code hardening}},
  url          = {{http://dx.doi.org/10.1007/s10207-015-0282-0}},
  volume       = {{15}},
  year         = {{2016}},
}

Altmetric
View in Altmetric
Web of Science
Times cited: