Invasive Attacks

Abstract : A smart card contains an embedded microchip with metallic contacts on the front. The smart card does not usually have its own power supply, yet it operates as a very small computer. The embedded operating system (OS) controls application execution, access condition, cryptographic routines, and communication protocols with the outside world(usually a terminal). Some smart cards have several applications embedded at a time; these are called "multi-application" smart cards. Invasive attacks refer to attacks of physical systems where the physical properties of the chip are irreversibly modified. Different kinds of attacks are possible using "standard" reverse engineering techniques with optical or scanning electron microscopes (SEM). The aim is to capture information stored in memory areas, or data flowing through the data bus, registers, etc. Such techniques are also used to disconnect circuits, to override sensors, or to defeat blown fuse links (using probe stations or Focused Ion Beam [FIB])
Type de document :
Article dans une revue
Encyclopedia of Cryptography and Security, 2, 2011, 2011 (Part 9), pp.Pages 623-629. 〈10.1007/978-1-4419-5906-5_511〉
Liste complète des métadonnées

https://hal-emse.ccsd.cnrs.fr/emse-00644128
Contributeur : Assia Tria <>
Soumis le : mercredi 23 novembre 2011 - 16:07:58
Dernière modification le : mercredi 29 novembre 2017 - 15:14:31

Identifiants

Collections

Citation

Assia Tria, Hamid Choukri. Invasive Attacks. Encyclopedia of Cryptography and Security, 2, 2011, 2011 (Part 9), pp.Pages 623-629. 〈10.1007/978-1-4419-5906-5_511〉. 〈emse-00644128〉

Partager

Métriques

Consultations de la notice

619