Invasive Attacks - Mines Saint-Étienne Access content directly
Journal Articles Encyclopedia of Cryptography and Security, 2 Year : 2011

Invasive Attacks


A smart card contains an embedded microchip with metallic contacts on the front. The smart card does not usually have its own power supply, yet it operates as a very small computer. The embedded operating system (OS) controls application execution, access condition, cryptographic routines, and communication protocols with the outside world(usually a terminal). Some smart cards have several applications embedded at a time; these are called "multi-application" smart cards. Invasive attacks refer to attacks of physical systems where the physical properties of the chip are irreversibly modified. Different kinds of attacks are possible using "standard" reverse engineering techniques with optical or scanning electron microscopes (SEM). The aim is to capture information stored in memory areas, or data flowing through the data bus, registers, etc. Such techniques are also used to disconnect circuits, to override sensors, or to defeat blown fuse links (using probe stations or Focused Ion Beam [FIB])
No file

Dates and versions

emse-00644128 , version 1 (23-11-2011)



Assia Tria, Hamid Choukri. Invasive Attacks. Encyclopedia of Cryptography and Security, 2, 2011, 2011 (Part 9), pp.Pages 623-629. ⟨10.1007/978-1-4419-5906-5_511⟩. ⟨emse-00644128⟩
603 View
0 Download



Gmail Facebook X LinkedIn More