Advanced search
1 file | 569.57 KB

Link-time smart card code hardening

Ronald De Keulenaer (UGent) , Jonas Maebe (UGent) , Koen De Bosschere (UGent) and Bjorn De Sutter (UGent)
Author
Organization
Abstract
This paper presents a feasibility study to protect smart card software against fault-injection attacks by means of link-time code rewriting. This approach avoids the drawbacks of source code hardening, avoids the need for manual assembly writing, and is applicable in conjunction with closed third-party compilers. We implemented a range of cookbook code hardening recipes in a prototype link-time rewriter and evaluate their coverage and associated overhead to conclude that this approach is promising. We demonstrate that the overhead of using an automated link-time approach is not significantly higher than what can be obtained with compile-time hardening or with manual hardening of compiler-generated assembly code.
Keywords
SOFTWARE, DIVERSITY, Software protection, Binary rewriting, Smart card, Fault, Overhead

Downloads

  • link-time smart card code hardening.pdf
    • full text
    • |
    • open access
    • |
    • PDF
    • |
    • 569.57 KB

Citation

Please use this url to cite or link to this publication:

Chicago
De Keulenaer, Ronald, Jonas Maebe, Koen De Bosschere, and Bjorn De Sutter. 2016. “Link-time Smart Card Code Hardening.” International Journal of Information Security 15 (2): 111–130.
APA
De Keulenaer, R., Maebe, J., De Bosschere, K., & De Sutter, B. (2016). Link-time smart card code hardening. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 15(2), 111–130.
Vancouver
1.
De Keulenaer R, Maebe J, De Bosschere K, De Sutter B. Link-time smart card code hardening. INTERNATIONAL JOURNAL OF INFORMATION SECURITY. Springer Berlin Heidelberg; 2016;15(2):111–30.
MLA
De Keulenaer, Ronald, Jonas Maebe, Koen De Bosschere, et al. “Link-time Smart Card Code Hardening.” INTERNATIONAL JOURNAL OF INFORMATION SECURITY 15.2 (2016): 111–130. Print.
@article{6958527,
  abstract     = {This paper presents a feasibility study to protect smart card software against fault-injection attacks by means of link-time code rewriting. This approach avoids the drawbacks of source code hardening, avoids the need for manual assembly writing, and is applicable in conjunction with closed third-party compilers. We implemented a range of cookbook code hardening recipes in a prototype link-time rewriter and evaluate their coverage and associated overhead to conclude that this approach is promising. We demonstrate that the overhead of using an automated link-time approach is not significantly higher than what can be obtained with compile-time hardening or with manual hardening of compiler-generated assembly code.},
  author       = {De Keulenaer, Ronald and Maebe, Jonas and De Bosschere, Koen and De Sutter, Bjorn},
  issn         = {1615-5262},
  journal      = {INTERNATIONAL JOURNAL OF INFORMATION SECURITY},
  keyword      = {SOFTWARE,DIVERSITY,Software protection,Binary rewriting,Smart card,Fault,Overhead},
  language     = {eng},
  number       = {2},
  pages        = {111--130},
  publisher    = {Springer Berlin Heidelberg},
  title        = {Link-time smart card code hardening},
  url          = {http://dx.doi.org/10.1007/s10207-015-0282-0},
  volume       = {15},
  year         = {2016},
}

Altmetric
View in Altmetric
Web of Science
Times cited: