Invasive Attacks - Mines Saint-Étienne Accéder directement au contenu
Article Dans Une Revue Encyclopedia of Cryptography and Security, 2 Année : 2011

Invasive Attacks

Résumé

A smart card contains an embedded microchip with metallic contacts on the front. The smart card does not usually have its own power supply, yet it operates as a very small computer. The embedded operating system (OS) controls application execution, access condition, cryptographic routines, and communication protocols with the outside world(usually a terminal). Some smart cards have several applications embedded at a time; these are called "multi-application" smart cards. Invasive attacks refer to attacks of physical systems where the physical properties of the chip are irreversibly modified. Different kinds of attacks are possible using "standard" reverse engineering techniques with optical or scanning electron microscopes (SEM). The aim is to capture information stored in memory areas, or data flowing through the data bus, registers, etc. Such techniques are also used to disconnect circuits, to override sensors, or to defeat blown fuse links (using probe stations or Focused Ion Beam [FIB])
Fichier non déposé

Dates et versions

emse-00644128 , version 1 (23-11-2011)

Identifiants

Citer

Assia Tria, Hamid Choukri. Invasive Attacks. Encyclopedia of Cryptography and Security, 2, 2011, 2011 (Part 9), pp.Pages 623-629. ⟨10.1007/978-1-4419-5906-5_511⟩. ⟨emse-00644128⟩
603 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More