Capítulo de livro Acesso aberto Revisado por pares

Malicious Code on Java Card Smartcards: Attacks and Countermeasures

2008; Springer Science+Business Media; Linguagem: Inglês

10.1007/978-3-540-85893-5_1

ISSN

1611-3349

Autores

Wojciech Mostowski, Erik Poll,

Tópico(s)

Web Application Security Vulnerabilities

Resumo

When it comes to security, an interesting difference between Java Card and regular Java is the absence of an on-card bytecode verifier on most Java Cards. In principle this opens up the possibility of malicious, ill-typed code as an avenue of attack, though the Java Card platform offers some protection against this, notably by code signing. This paper gives an extensive overview of vulnerabilities and possible runtime countermeasures against ill-typed code, and describes results of experiments with attacking actual Java Cards currently on the market with malicious code.

Referência(s)