Skip to Main content Skip to Navigation
Journal articles

Invasive Attacks

Abstract : A smart card contains an embedded microchip with metallic contacts on the front. The smart card does not usually have its own power supply, yet it operates as a very small computer. The embedded operating system (OS) controls application execution, access condition, cryptographic routines, and communication protocols with the outside world(usually a terminal). Some smart cards have several applications embedded at a time; these are called "multi-application" smart cards. Invasive attacks refer to attacks of physical systems where the physical properties of the chip are irreversibly modified. Different kinds of attacks are possible using "standard" reverse engineering techniques with optical or scanning electron microscopes (SEM). The aim is to capture information stored in memory areas, or data flowing through the data bus, registers, etc. Such techniques are also used to disconnect circuits, to override sensors, or to defeat blown fuse links (using probe stations or Focused Ion Beam [FIB])
Document type :
Journal articles
Complete list of metadata
Contributor : Assia Tria Connect in order to contact the contributor
Submitted on : Wednesday, November 23, 2011 - 4:07:58 PM
Last modification on : Wednesday, June 24, 2020 - 4:18:31 PM



Assia Tria, Hamid Choukri. Invasive Attacks. Encyclopedia of Cryptography and Security, 2, 2011, 2011 (Part 9), pp.Pages 623-629. ⟨10.1007/978-1-4419-5906-5_511⟩. ⟨emse-00644128⟩



Record views