<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Live from Cardis2010: Combined attacks on Java Card</title>
	<atom:link href="http://javacard.vetilles.com/2010/04/15/live-from-cardis2010-combined-attacks-on-java-card/feed/" rel="self" type="application/rss+xml" />
	<link>http://javacard.vetilles.com/2010/04/15/live-from-cardis2010-combined-attacks-on-java-card/</link>
	<description>A weblog on Java Card, security, and other things personal</description>
	<lastBuildDate>Thu, 18 May 2017 07:26:32 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.32</generator>
	<item>
		<title>By: Thiebeauld Hugues</title>
		<link>http://javacard.vetilles.com/2010/04/15/live-from-cardis2010-combined-attacks-on-java-card/#comment-4214</link>
		<dc:creator><![CDATA[Thiebeauld Hugues]]></dc:creator>
		<pubDate>Wed, 08 Sep 2010 09:15:27 +0000</pubDate>
		<guid isPermaLink="false">http://javacard.vetilles.com/?p=569#comment-4214</guid>
		<description><![CDATA[I would just like to add few comments on your interesting post and go further in the discussion.

For the kind of attack, like we have presented with Guillaume at CARDIS, I consider you can see it under several angles. Let me just depict several of these angles:
1- the attack consists mainly in another type confusion. Nothing really new on that point of view, you&#039;re right
1 bis - to perform the attack, a single fault injection was necessary, aiming at skipping some instructions in the normal execution flow. Once again, it&#039;s not new, as it is common in the smartcard industry.
2- it is an illustration how a previous legal application becomes illegal, ill formed, by using a physical perturbation. From this angle, this attack&#039;s principle is very close to your concept of mutant application. It reveals that the security should not be based only on a single protection, but rather on regular, and preferably dynamic, controls.
3- the must interesting angle, from my opinion, is how new features, or new services, not necessarily directly linked with the security, can be tampered with to defeat the security of a product. Our article outlined how the new class object exploitation led to a potential weakness, if no security consideration have been taken into account in its implementation. 

Regarding the last angle, such papers are very important. They reveal that new feature or functionality should not be added without a strong understanding of their impact in the product security. This should be done in accordance with the environment specificities the product is supposed to embrace, taking into account the specific threats and vulnerabilities.

Hope this post will be worth of interest.
Hugues]]></description>
		<content:encoded><![CDATA[<p>I would just like to add few comments on your interesting post and go further in the discussion.</p>
<p>For the kind of attack, like we have presented with Guillaume at CARDIS, I consider you can see it under several angles. Let me just depict several of these angles:<br />
1- the attack consists mainly in another type confusion. Nothing really new on that point of view, you&#8217;re right<br />
1 bis &#8211; to perform the attack, a single fault injection was necessary, aiming at skipping some instructions in the normal execution flow. Once again, it&#8217;s not new, as it is common in the smartcard industry.<br />
2- it is an illustration how a previous legal application becomes illegal, ill formed, by using a physical perturbation. From this angle, this attack&#8217;s principle is very close to your concept of mutant application. It reveals that the security should not be based only on a single protection, but rather on regular, and preferably dynamic, controls.<br />
3- the must interesting angle, from my opinion, is how new features, or new services, not necessarily directly linked with the security, can be tampered with to defeat the security of a product. Our article outlined how the new class object exploitation led to a potential weakness, if no security consideration have been taken into account in its implementation. </p>
<p>Regarding the last angle, such papers are very important. They reveal that new feature or functionality should not be added without a strong understanding of their impact in the product security. This should be done in accordance with the environment specificities the product is supposed to embrace, taking into account the specific threats and vulnerabilities.</p>
<p>Hope this post will be worth of interest.<br />
Hugues</p>
]]></content:encoded>
	</item>
</channel>
</rss>
