<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>On the road to Bandol &#187; News</title>
	<atom:link href="https://javacard.vetilles.com/category/news/feed/" rel="self" type="application/rss+xml" />
	<link>https://javacard.vetilles.com</link>
	<description>A weblog on Java Card, security, and other things personal</description>
	<lastBuildDate>Mon, 18 Aug 2025 06:48:26 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.32</generator>
	<item>
		<title>Java Card++ ?</title>
		<link>https://javacard.vetilles.com/2025/08/18/java-card/</link>
		<comments>https://javacard.vetilles.com/2025/08/18/java-card/#comments</comments>
		<pubDate>Mon, 18 Aug 2025 06:47:58 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Java Card 2.x]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=26403</guid>
		<description><![CDATA[I was part of the team that defined the binary format that has been in use since the end of the 1990&#8217;s. The selected solution was not my preferred one, as I preferred a pre-linked version. At the time, everybody agreed that on-card verification was too ambitious, so this was never considered for Java Card [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>I was part of the team that defined the binary format that has been in use since the end of the 1990&#8217;s. The selected solution was not my preferred one, as I preferred a pre-linked version. At the time, everybody agreed that on-card verification was too ambitious, so this was never considered for Java Card 2.1, the ancestor of today&#8217;s Java Card specification.</p>
<p>In the following years, we wasted a lot of time working on a much more ambitious version of Java Card, which never made it, but we never worked on addressing this issue of unverified bytecode, mostly because we had the cryptographic protections provided by GlobalPlatform. If nobody can load unverified bytecode, where is the problem?</p>
<p>As an evaluator, this allowed me to reverse engineer many types of Java Card, as I was allowed to download unverified (and very much illegal) bytecode into cards. Over time, most virtual machines have included runtime countermeasures, and some implementations have been difficult to attack with illegal bytecode for quite a while.</p>
<p>Yet, Java Card has become an industry standard. Strong implementations exist, in which loading unverified bytecode is about impossible, and then, exploiting unverified bytecode is challenging. But on the other hand, weaker platforms also exist, and recently, following a combination of mistakes from various stakeholders, <a href="https://security-explorations.com/esim-security.html" class="liexternal">one of them was broken</a>; luckily, by a researcher, not by a criminal.</p>
<p>The real surprise is not that this has happened. It is that it took over 25 years for it to happen. The lack of on-card verification has always been a weakness in the Java Card story. Over the past 25 years, there have been a few attempts to address the issue, but the industry never adopted them. Isn&#8217;t a solution to this issue a bit overdue?</p>
<p>The smart card industry is a small industry, with few actors, and Java Card has been a great success, its interoperability providing the basis for the deployment of billions of products every year. But the industry has been complacent, and although I am not part of it any more, I bear some of this responsibility since I have headed the Java Card Forum&#8217;s Technical Committee for a few years. I defended off-card bytecode verification many times, for instance  <a href="https://javacard.vetilles.com/2011/10/19/the-misuse-of-bytecode-verification/" class="liexternal">in 2011</a> and quite vehemently <a href="https://javacard.vetilles.com/2013/11/21/the-off-card-byte-code-verifier-is-fine-thank-you/" class="liexternal">in 2013</a>.</p>
<p>But that was over 10 years ago, and I would now argue that it&#8217;s time to fix this issue. Despite minor updates, the core Java Card technology is over 25 years old. The similarity between the latest version of the Java Card Virtual Machine specification with its first interoperable version is striking. There have been almost no changes. The CAP file format is antiquated, and an update could allow all vendors to ensure that no illegal bytecode is allowed to run on the any card.</p>
<p>From a now outsider&#8217;s viewpoint, I believe that after the recent developments and an issue impacting the security of millions of unsuspecting users, the usual denials sound really out of touch with reality, so I am asking the Java Card community a simple question: Since you are pushing for Java Card to be the basis for our personal security, and asking us to trust you with our sensitive data, including our identity, isn&#8217;t it now the right time to put this bytecode issue behind us once and for all?</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2025/08/18/java-card/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Uh oh, Google just stopped updating my kids&#8217; phones</title>
		<link>https://javacard.vetilles.com/2019/05/20/uh-oh-google-just-stopped-updating-my-kids-phones/</link>
		<comments>https://javacard.vetilles.com/2019/05/20/uh-oh-google-just-stopped-updating-my-kids-phones/#comments</comments>
		<pubDate>Mon, 20 May 2019 20:13:32 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Discussions]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Android]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=26391</guid>
		<description><![CDATA[So, Google has revoked Huawei&#8217;s Android license. Huawei&#8217;s new phones won&#8217;t get any of the nice Google features like Google&#8217;s store, Gmail, and more. But also, all existing Huawei phones will stop receiving updates from Google. What? This includes my kids&#8217; Honor-branded phones, and as far as I know, a significant portion of the kids [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>So, Google has revoked Huawei&#8217;s Android license. Huawei&#8217;s new phones won&#8217;t get any of the nice Google features like Google&#8217;s store, Gmail, and more. But also, all existing Huawei phones will stop receiving updates from Google.</p>
<p>What? This includes my kids&#8217; Honor-branded phones, and as far as I know, a significant portion of the kids in their middle school, as Honor has been proposing phones with a great value for a few years, and they are popular in that population who are usually not getting the top-of-the-line models.</p>
<p>I could also have titled this blog more provocatively as &#8220;Google denies basic security to their customers,&#8221; &#8220;Donald Trump throws millions of kids in hackers&#8217; hands,&#8221; or &#8220;Evil Americans exercise extra-territorial power over people around the world.&#8221; There are plenty of opportunities here to be angry, but the problem is elsewhere.</p>
<p>There is here a trust and liability issue. When I buy an Android phone, I expect some service from the vendor, but I also expect some services from Google. In my professional life, I am battling for improving IoT security, making updates mandatory and secure, among other things. Until now, this was a battle against slackers and profiteers, but today, politics is getting in the way. If hackers benefit from this, who can be held liable? Is this just Huawei? Doesn&#8217;t Google share some responsibility for stopping their support? My kids have done nothing, for sure.</p>
<p>Most comments seem to emphasize that Google dealt a big blow to Huawei, but Google has also dealt a big blow to themselves: Huawei didn&#8217;t cut my kids&#8217; updates, Google did. This really has some consequences on the Android model: When you buy a phone with Android, you introduce a dependency between you and both the device vendor and Google, and you will be a collateral victim if their relationship turns sour. This almost sounds like Apple; when you get an iPhone, you belong to Apple, but at least, only to Apple.</p>
<p>It makes me rethink seriously my dependency on Google, so it&#8217;s time to take some strong decisions. I will switch my family streaming subscription from Google Play Music to Spotify, just to make sure that my kids still enjoy music on their unsupported phones. And if this madness continues, I will move them to Huawei&#8217;s app store as wellâ€¦ </p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2019/05/20/uh-oh-google-just-stopped-updating-my-kids-phones/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Should we Protect Cars from Terrorists?</title>
		<link>https://javacard.vetilles.com/2017/09/05/should-we-protect-cars-from-terrorists/</link>
		<comments>https://javacard.vetilles.com/2017/09/05/should-we-protect-cars-from-terrorists/#comments</comments>
		<pubDate>Tue, 05 Sep 2017 15:07:54 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=26372</guid>
		<description><![CDATA[Some days ago, Mark Cuban published on LinkedIn a question about weaponized cars: who has developed solutions to detect/prevent such events? I live close to Nice, so I would definitely extend the question to trucks, and basically to anything heavy that moves faster tn humans. Terrorists are not easy to distinguish from normal drivers before [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Some days ago, Mark Cuban published on LinkedIn a question about <a href="https://www.linkedin.com/feed/update/urn:li:activity:6304720723394990080?lipi=urn%3Ali%3Apage%3Ad_flagship3_pulse_read%3Bf6HGjEd8SdGitOKt9Ao60w%3D%3D" class="liexternal">weaponized cars</a>: who has developed solutions to detect/prevent such events? I live close to Nice, so I would definitely extend the question to trucks, and basically to anything heavy that moves faster tn humans.</p>
<h4>Terrorists are not easy to distinguish from normal drivers before it&#8217;s too late</h4>
<p>In the real life of a security consultant, terrorists are a problem in a risk analysis. Whatever technology you think about can be somehow abused by terrorists, and terrorists are really an annoying kind of attacker:</p>
<ul>
<li>Terrorists don&#8217;t care about being caught or killed, which greatly limits the efficiency of many countermeasures, which are designed to make sure that the bad guys eventually get caught (like good logs). With terrorists in a car, the only countermeasure that works is the one that stops them immediately.
</li>
<li>Terrorists are often &#8220;bad users&#8221; rather than intruders, which means that countermeasures against them must be applied against users. If a car decides to crash itself following a perceived attack, it better be sure that it is actually driven by a terrorist, not just a careless driver.
</li>
<li>Any drastic countermeasure that is designed against terrorists may be misused by other attackers (or even by terrorists themselves) to create havoc. Self-destructing cars are not a pretty sight.
</li>
</ul>
<p>In the end, because of these and similar issues, in a classical risk analysis, terrorists are not listed among the bad guys, and if they are, they are explicitly ignored. Yet, Mark Cuban&#8217;s question makes sense, so should we do something about it? I have browsed some of the answers to his question, and I am now reaching my own conclusions:</p>
<ul>
<li>First, whatever we will do on vehicles now will not affect older vehicles, so terrorists will still have access to a large number of weapons for many years to come.
</li>
<li>The first consequence is that it is necessary to work on the infrastructure. In Nice, the Promenade des Anglais is now protected physically against weaponized vehicles. They have done a rather good job, using small poles and palm trees as obstacles.
</li>
<li>Also, infrastructure has an IoT component, such as the V2I (vehicle-to-infrastructure) communication. The infrastructure can therefore emit an emergency signal to surrounding vehicles when it detects a potential attack.
</li>
<li>Beyond responding to such infrastructure events, adding countermeasures in cars is difficult. The guy who drives on the sidewalk may be escaping from terrorists, so such countermeasures would still be hard to define.
</li>
<li>Any measure based on deep learning and analysis of drivers&#8217; behavior is also very hard to define and enforce without moving straight to a police state.
</li>
<li>In the long term, full and mandatory automation sounds like a good countermeasure, which also addresses many more problems.
</li>
</ul>
<p>But then, none of this is easy. If we consider the emergency signal sent by the infrastructure in case of attack, there are many potential issues:</p>
<ul>
<li>If someone simply crashes into a barrier, who will decide that it is not an attack, and how long will that take?
</li>
<li>Emergency vehicles should not be directly affected by the emergency signal. But then, we need to ensure that terrorists don&#8217;t steal emergency vehicles.
</li>
<li>How can we refrain bad guys (terrorists or not) from sending emergency signal just to stop traffic?
</li>
</ul>
<h4>There is always a trade-off between our protection and our freedom</h4>
<p>In the end, I am not sure that we are ready yet to do anything to deter terrorists from weaponizing our vehicles. The main reason is that the security measures required to do so impose strong contraints on us. So far, we have accepted additional constraints in airports and planes, but we balk at a laptop ban in long-haul flights. And I am quite sure that our tolerance threshold in our cars is very low.</p>
<p>So, we should of course protect our cars from terrorists, but I am afraid that we will not do anything about it for now.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2017/09/05/should-we-protect-cars-from-terrorists/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Des contraintes naÃ®t la beautÃ©</title>
		<link>https://javacard.vetilles.com/2017/05/16/des-contraintes-nait-la-beaute/</link>
		<comments>https://javacard.vetilles.com/2017/05/16/des-contraintes-nait-la-beaute/#comments</comments>
		<pubDate>Tue, 16 May 2017 21:37:38 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=26354</guid>
		<description><![CDATA[This quote from Leonardo da Vinci &#8220;Beauty is born from constraints&#8221; was chosen by Alain Colmerauer as the motto for Prolog IV, the last iteration (for now) of the Prolog language, dÃ©veloped by Prologia in the early 1990&#8217;s. Alain Colmerauer passed away this week. I have plenty of memories about him, starting from classes with [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>This quote from Leonardo da Vinci &#8220;Beauty is born from constraints&#8221; was chosen by Alain Colmerauer as the motto for Prolog IV, the last iteration (for now) of the Prolog language, dÃ©veloped by Prologia in the early 1990&#8217;s.</p>
<p>Alain Colmerauer passed away this week. I have plenty of memories about him, starting from classes with him in Marseille, where his way to present constraint programming was as strange as it was passionate. Even before that, during my studies at Marseille&#8217;s <em>Groupe d&#8217;Intelligence Artificielle</em>, heavy on logic and Prolog, Alain Colmerauer was the name that made us all dream about research and fame.</p>
<p>Constraint programming at Prologia was intended to solve practical problems, in scheduling, optimization, and other NP-complete problems. That was fun for me, but Alain didn&#8217;t care: for him,  what counted most was the beauty of the language, the ability to describe the language with the simplest theory possible. <a href="http://prolog-heritage.org/en/ph30.html" class="liexternal">Prolog III</a>, the first constraint language he developed, used linear programming on rational numbers, which could not solve all problems, but was mathematically exact.</p>
<p>In <a href="http://prolog-heritage.org/en/ph40.html" class="liexternal">Prolog IV</a>, we wanted to solve more general problems, and we started using intervals on less exact floating-point numbers. Alain was not enthusiastic at first, but things got better when we realized that floating-point numbers are actually rational numbers (<em>i.e.</em>, exact numbers, not some approximation).</p>
<p>While I was writing my dissertation, I spent some evenings with Alain discussing potential formalizations of our constraints, and we ended up defining a notion of approximation to map a set to a smaller set of approximated values, and building something on it. I was quite proud of it, and I still am, but Alain was disappointed by the fact that the properties defining an approximation was too complex.</p>
<p>For me, that&#8217;s the legacy of Alain Colmerauer: even in the most complex thing, program, or language, a simple and elegant view of it is carefully hidden, and can be uncovered if you look for it carefully enough.</p>
<p>RIP, Alain.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2017/05/16/des-contraintes-nait-la-beaute/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Can we try to get some IoT devices right?</title>
		<link>https://javacard.vetilles.com/2017/02/20/can-we-try-to-get-some-iot-devices-right/</link>
		<comments>https://javacard.vetilles.com/2017/02/20/can-we-try-to-get-some-iot-devices-right/#comments</comments>
		<pubDate>Mon, 20 Feb 2017 14:44:02 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=26359</guid>
		<description><![CDATA[Last week at RSA, various crypto stars, including Don Rivest, Adi Shamir, and Whitfield Diffie, have discussed security research trends in a panel, and the conclusion seems to be that quantum computing and AI are not the real priority with the Internet of Things. The priority is, or should be, to invest in better programming. [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Last week at RSA, various crypto stars, including Don Rivest, Adi Shamir, and Whitfield Diffie, have discussed security research trends in a panel, and the conclusion seems to be that quantum computing and AI are not the real priority with the Internet of Things. The priority is, or should be, to invest in better programming.</p>
<blockquote><p>If the resources spent on interactive security, such as firewalls and antivirus and the like, were spent on improvements in the logical functioning of devices and a big improvement in quality of programming, we would get much better results<br />
<strong>Whitfield Diffie</strong></p></blockquote>
<p>Close to 15 years ago, I was working on a static analyzer for Java ME, and still hoping that mobile devices could avoid the viruses and malware that were already plaguing PCs at that time. Well, that could have happened, but Symbian was already going bad. Smartphones nailed it: mobile would have malware.</p>
<p>The good thing with IoT is that there has been no suspense. Botnets have come very early in the game. The consequence is that everybody seems to assume today that connected devices will necessarily be ridden with bugs and vulnerabilities. That is a major factor pushing towards preventive security measures, because we now assume that there are problems everywhere.</p>
<p>The reason for my mobile optimism came from smart cards and Java Card. These things have been attacked, but malware has never been a problem. The reason is very simple: smart cards are very far from open. Only their provider can load software on them, and they make sure to protect this privilege.</p>
<p>The good news is that most connected devices are just as closed. New software can only (legally) come from their developers. And like smart cards, their software is often relatively simple, simple enough to deploy a few good security measures.</p>
<p>The bad news is that the current botnet epidemics is the consequence of blatant negligence in the development of connected devices (mostly because security is an externality). There will be bad devices.</p>
<p>In the end, we have three complementary approaches to addressing connected device security:</p>
<ul>
<li><strong>Fight negligence</strong>. Enforce regulation to make vendors liable for the security problems they cause through their negligence.
</li>
<li><strong>Deploy preventive measures</strong>. Deploy tools that detect attacks, mitigate them &#8220;live&#8221; as they happen, and learn about the attacks for the future.
</li>
<li><strong>Make devices better</strong>. Spend more on the design and development of devices to reduce security vulnerabilities and make devices harder to attack.
</li>
</ul>
<p>We will need all three, for sure, but the priorities are difficult to set. It&#8217;s easy to guess that my preference goes to making devices better, and I am quite happy to hear that Whitfield Diffie leans in the same direction.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2017/02/20/can-we-try-to-get-some-iot-devices-right/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Attacking IoT is really easy</title>
		<link>https://javacard.vetilles.com/2017/02/10/attacking-iot-is-really-easy/</link>
		<comments>https://javacard.vetilles.com/2017/02/10/attacking-iot-is-really-easy/#comments</comments>
		<pubDate>Fri, 10 Feb 2017 07:55:18 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[IoT Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[formal]]></category>
		<category><![CDATA[iot]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=26325</guid>
		<description><![CDATA[A few days ago, Metasploit has announced that their famous tool is now available to car hackers, and soon for any connected object. Metasploit is a well-known tool for web apps, and extending it to objects simply makes these objects as easy to hack as web apps. Indeed, there are many aspects in common between [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>A few days ago, Metasploit has announced that their famous tool is now <a href="https://www.theregister.co.uk/2017/02/03/metasploit_hardware_upgrade/" class="liexternal">available to car hackers</a>, and soon for any connected object.</p>
<p>Metasploit is a well-known tool for web apps, and extending it to objects simply makes these objects as easy to hack as web apps. Indeed, there are many aspects in common between a Web App and a Connected Object: they can be reached from internet, they run complex software, they can be targeted by ransomware, and they can be misused.</p>
<p>Then, there are differences, and these differences make objects easier to hack than web apps. The most commonly cited is the lack of supervision of connected objects. This has allowed the creation of very large botnets of connected objects, and will most likely continue and worsen in the next few years, because few people realize that their fridge is in a botnet.</p>
<p>There is another difference, more subtle, but with great consequences on security: the objectsâ€™ availability. When targeting a web app, an attacker may know some of the software that has been used to build the app. He may even be aware of some vulnerabilities in this software. However, the attacker will know nothing of the productâ€™s configuration, or of the security products and countermeasures deployed to protect it.</p>
<p>In order to design an attack, information must be gathered by probing the web app â€œliveâ€, taking the risk of being detected by a sophisticated IDS or IPS, or of hitting a honeypot that will record his attack techniques. Metasploit helps by providing tools and a database of known issues, but such attacks still require great skills.</p>
<p>Now, letâ€™s consider a connected object, even a complex one like a car. The attacker can tear the object apart, get access to memory chips, dump their content, and analyze it. This analysis will take time and resources, but there is no risk of getting caught, and countermeasures will eventually be exposed together with vulnerabilities. Metasploit will make the task even easier if the device includes known vulnerabilities. In the end, the attacker will obtain a viable attack path, by working in the security of a lab.</p>
<p>Detection is very difficult in such conditions. An IDS will protect a connected car, for instance, against random remote attacks. But a skilled attacker will only perform a live attack on a Connected Car after verifying that the IDS doesnâ€™t catch it.</p>
<p>And this is only the beginning. Security research on connected objects is rather new, and focuses on the easiest targets. Skills will improve over time, making more sophisticated targets vulnerable. Now, letâ€™s add to this equation an AI to assist in the reverse engineering and the identification of vulnerabilities. Traditional defenses are toast.</p>
<p>In a few years, if there is a vulnerability in a connected object, someone will find it and maybe exploit it. Encryption will provide a temporary protection. Trusted Execution Environments will add some hurdles. But these are just new countermeasures, not game changers.</p>
<p>Thatâ€™s what I like in formally proven software. A mathematical proof that a piece of software does not leak information is a good countermeasure against reverse engineering AIs. With such a proof, finding a vulnerability is not about finding a software bug, itâ€™s about finding an issue in a formal model that could lead to a wrong proof that could hide a bug. And thatâ€™s orders of magnitude more difficult, even for an AI.</p>
<p>Originally published on <a href="https://www.linkedin.com/pulse/attacking-iot-really-easy-eric-vÃ©tillard" class="liexternal">LinkedIn</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2017/02/10/attacking-iot-is-really-easy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Fighting poker-winning AIs on IoT Security</title>
		<link>https://javacard.vetilles.com/2017/02/02/fighting-poker-winning-ais-on-iot-security/</link>
		<comments>https://javacard.vetilles.com/2017/02/02/fighting-poker-winning-ais-on-iot-security/#comments</comments>
		<pubDate>Thu, 02 Feb 2017 14:27:14 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[IoT Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[iot]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=26321</guid>
		<description><![CDATA[Published attacks tend to repeat themselves this year, but in the last few days, there has been a few interesting events and publications, in particular: Adi Shamir has made gloomy predictions about security in the next 15 years. Bruce Schneier has published a long essay about IoT security, with a vibrant and desperate call for [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Published attacks tend to repeat themselves this year, but in the last few days, there has been a few interesting events and publications, in particular:</p>
<ul>
<li>Adi Shamir has made <a href="http://www.lightbluetouchpaper.org/2016/02/22/financial-cryptography-2016/#comment-1456744" class="liexternal">gloomy predictions</a> about security in the next 15 years.</li>
<li>Bruce Schneier has published a <a href="http://www.schneier.com/blog/archives/2017/02/security_and_th.html" class="liexternal">long essay</a> about IoT security, with a vibrant and desperate call for action to governments.</li>
<li>An AI is <a href="http://www.wired.com/2017/01/mystery-ai-just-crushed-best-human-players-poker/" class="liexternal">winning at poker</a> against some of the best human players.</li>
</ul>
<p><span id="more-26321"></span></p>
<p>From these three sources, it sure looks like things will get worse before they get better. Let&#8217;s start by Shamir&#8217;s views on cybersecurity:</p>
<ol>
<li>Cybersecurity is terrible, and it will get worse.</li>
<li>The Internet of Things will be a security disaster.</li>
<li>Cyber warfare will be the norm rather than the exception in conflicts.</li>
</ol>
<p>All of this sounds very real today, so Shamir is just implying that it&#8217;s not going to get better any time soon. Schneier, on the other hand, is not giving up, by asking for a new government regulatory agency, and also for a body of public-interest technologists, who would be provide expertise into the public debate about technology.</p>
<p>That brings us to the third piece of news. An AI managed to win against really good poker players over several days. This requires strategy, bluffing, and much more. By extension, an AI can now pose as humans or beat humans in any narrowly defined situation, even when complex strategic thinking is required. OK, but even as I write it, I have a problem grasping the consequences of this sentence. I know a things or two about computing in general, and even about AI. Yet, it is very hard to see where that leads us, and how it applies to other fields, like cybersecurity.</p>
<p>So yes, Schneier is probably right in asking for regulatory agencies and public-interest technologists, because of the complexity of today&#8217;s technological issues. Shamir is probably right too, because Schneier is not going to get what he asks for, at least not in Trump&#8217;s USA (and I wouldn&#8217;t bet that we will get it in today&#8217;s Europe, either). So, what consequences does it have for &#8220;us&#8221;?</p>
<p>First, we have to stand strong ourselves. What we are doing at Prove &#038; Run is right. Making devices stronger and more resilient/resistant to attacks is essential in the fight against attackers. And even if a majority of IoT actors don&#8217;t care, there remain enough responsible vendors to make a huge market for ProvenCore and applications.</p>
<p>Then, we need to remain humble. Stronger devices are not sufficient by themselves. 10 years ago, as an evaluator, I have used static analysis on Java Card programs to detect vulnerabilities that were very hard to find &#8220;manually&#8221;, with amazing success. So, if a small research team can program an AI that beats professional poker players, how long will it be before some team of hackers programs an AI that designs attacks on IoT systems? And if that happens, how much will our formal proofs matter? Even if our software is not broken, how easy will it be to bypass it?</p>
<p>French students learn in school about the great <em><a href="http://en.wikipedia.org/wiki/Maginot_Line" rel="nofollow" class="liwikipedia">ligne Maginot</a></em>, a very strong line of defense against Germany built in the early 1930&#8217;s. The Germans did not break it, they circumvented it.</p>
<p>I believe more strongly than ever that high-assurance security components and formally proven software are essential components of future secure systems. But we have to face a difficult challenge: make sure that no human or AI is able to bypass our highly resistant technology, effectively making it a 21st century ligne Maginot.</p>
<p>We can and will succeed. Our &#8220;We are the most secure&#8221; arguments are needed to attract our customers&#8217; attention, but we must be careful to move to more complex &#8220;We are the foundations of the most secure systems&#8221; arguments as their understanding of the issues at stake improves and we get closer to implementation.</p>
<p>And let&#8217;s keep an eye on this AI thing.</p>
<p>Originally published on <a href="https://www.linkedin.com/pulse/fighting-poker-winning-ais-iot-security-eric-vÃ©tillard" class="liexternal">LinkedInï»¿</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2017/02/02/fighting-poker-winning-ais-on-iot-security/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Traffic cameras, legal rules, and accusers</title>
		<link>https://javacard.vetilles.com/2017/01/20/traffic-cameras-legal-rules-and-accusers/</link>
		<comments>https://javacard.vetilles.com/2017/01/20/traffic-cameras-legal-rules-and-accusers/#comments</comments>
		<pubDate>Fri, 20 Jan 2017 16:25:52 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=26318</guid>
		<description><![CDATA[A few days ago, I watched Gone Girl on TV, a story about mounting evidence against an innocent person. And then, I looked at an article about challenging a traffic camera citation (in the US). The link between the two stories is evidence, of course. Traffic camera evidence incriminates a car, not a driver. The [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>A few days ago, I watched <a href="https://en.wikipedia.org/wiki/Gone_Girl_(film)" rel="nofollow" class="liwikipedia">Gone Girl</a> on TV, a story about mounting evidence against an innocent person. And then, I looked at an article about <a href="http://www.thepublicdiscourse.com/2017/01/18093/" class="liexternal">challenging a traffic camera citation</a> (in the US). The link between the two stories is evidence, of course.</p>
<p>Traffic camera evidence incriminates a car, not a driver. The paper, written by a law professor, is interesting because it shows that the current processes around such evidence are not well covered by law (at least by U.S. law). When reading this paper, it becomes obvious that a &#8220;normal&#8221; citizen (<em>i.e.</em>, not a law professor) would have great difficulties challenging the traffic camera evidence.</p>
<p>Of course, this becomes scary when we add to the mix the gazillions devices that are currently spying or reporting on us. Google Maps tells us that Bob&#8217;s phone was around here at 10:33, Bob&#8217;s alarm system tells us that his phone or his badge was used to turn off the alarm at 10:36 exactly, Bob&#8217;s security camera recorded something at 10:39 exactly, Bob&#8217;s fitness sensor tells us he ran between 10:43 and 10:47. I am not sure that police would be able to get all this data, but I am quite certain that they will be able to get some in the very near future.</p>
<p>And I am also quite certain that most of these devices are hackable, clonable, or that cybercriminals could misuse them to plant digital evidence against many people (especially someone sleeping alone at home). Not sure that this will get anywhere, because there are ways to make a lot of money misusing connected stuff without doing anything that sophisticated.</p>
<p>Yet, the Gone Girl story reminds us that some people are highly motivated to do such things, and most likely ready to pay good money for it. I am really wondering how the legal system will deal with the flow of cyberevidence and other IoT data, and how they will combine it with the possibility that most systems collecting this data are fully automated (no real witnesses), and subject to many hacks. It will be interesting to follow how this evidence will be trusted in courts, compared to traditional forensic evidence like fingerprints, DNA, and other things who can also be planted.</p>
<p>We are moving into a post-truth world, not only in politics, and this lack of certitude will deeply impact our society.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2017/01/20/traffic-cameras-legal-rules-and-accusers/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The lowest hanging card</title>
		<link>https://javacard.vetilles.com/2016/12/06/the-lowest-hanging-card/</link>
		<comments>https://javacard.vetilles.com/2016/12/06/the-lowest-hanging-card/#comments</comments>
		<pubDate>Tue, 06 Dec 2016 13:45:13 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Banking]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[payment]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=26314</guid>
		<description><![CDATA[The latest news on six second card hacking is very entertaining, and frankly, not reassuring. This thing is just as simple that it is stupid. The CVV2/CVC2 is a secret number computed by banks using a secret key, so they are validated by the issuing bank. Apparently, most (all?) of them have chosen not to [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>The latest news on <a href="http://www.theregister.co.uk/2016/12/05/undetectable_sixsecond_visa_carding_priceless/" class="liexternal">six second card hacking</a> is very entertaining, and frankly, not reassuring. This thing is just as simple that it is stupid. The CVV2/CVC2 is a secret number computed by banks using a secret key, so they are validated by the issuing bank. Apparently, most (all?) of them have chosen not to count failed validation attempts from different sources. So, once you obtain raw card data (with no CVV2), you only need one attempt on 1000 sites to find the 3-digit value (it gets worse, read a few articles on this).</p>
<p>So, until some &#8220;velocity checks&#8221; (counters) are added to CVV2 validators, this is the lowest hanging card. The funny thing is that, since it only takes 6 seconds, changing the CVV every hour doesn&#8217;t really work, here, so the new Motion Code is not a good countermeasure.</p>
<p>Smart card hardliners will tell you that this isn&#8217;t a smart card issue. Sure, but it&#8217;s related, mostly because however high, there is <em>always</em> a lowest hanging card. Smart cards (with EMV) have been quite efficient at curbing card-present fraud, because the chip computes a dynamic verification code for every transaction. During the EMV rollout, fraud was taking place in countries where smart cards were not used. As this rollout is getting closer to completion, this opportunity is slowly going away.</p>
<p>The new lowest hanging fruit is online transactions. EMV doesn&#8217;t work online, mostly because all attempts to introduce card readers on normal PC&#8217;s have failed, so our smart cards are useless here. And because consumers haven&#8217;t been used to use their cards&#8217; chips during online transactions, they won&#8217;t do it on mobile transactions either.</p>
<p>Sadly, commerce is moving online these days, so it is not good news to find the lowest hanging fruit there. The CVV2 check will be fixed, and more merchants will use 2-channel verification methods like &#8220;Verified by Visa&#8221;. Then, it is not obvious to know what will be the new lowest hanging fruit.</p>
<p>One solution is to use mobile payment, which offers a much better security these days. It works for in-person payments, and it is starting to work for online payments made on phones. I haven&#8217;t seen mobile payment used for to verify online transactions not made on a phone, but this would be very easy to do.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2016/12/06/the-lowest-hanging-card/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>IoT Security as Externality: Cluelessness, Denial, and more</title>
		<link>https://javacard.vetilles.com/2016/11/21/iot-security-as-externality-cluelessness-denial-and-more/</link>
		<comments>https://javacard.vetilles.com/2016/11/21/iot-security-as-externality-cluelessness-denial-and-more/#comments</comments>
		<pubDate>Mon, 21 Nov 2016 08:00:49 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=26296</guid>
		<description><![CDATA[Not my problem. That&#8217;s the 3-word definition of an externality: something that you don&#8217;t need to deal with, because the adverse consequences are not affecting you directly. This has been an issue for cybersecurity forever (Schneier, 2007), and it is widely known that the issue is particularly pressing with IoT (Schneier again, 2016). I have [&#8230;]]]></description>
				<content:encoded><![CDATA[<blockquote><p><span style="font-size: x-large;">Not my problem.</span></p></blockquote>
<p>That&#8217;s the 3-word definition of an externality: something that you don&#8217;t need to deal with, because the adverse consequences are not affecting you directly. This has been an issue for cybersecurity forever (<a href="https://www.schneier.com/essays/archives/2007/01/information_security_1.html" class="liexternal">Schneier</a>, 2007), and it is widely known that the issue is particularly pressing with IoT (<a href="https://www.schneier.com/blog/archives/2016/10/security_econom_1.html" class="liexternal">Schneier</a> again, 2016).</p>
<p>I have been writing material on IoT device security as my day job for a few months now. But I also speak at conferences, where the public is more general: if there are device vendors in the room, I am not sure of what they think about this, so I mention the issue.</p>
<p>After doing so a few times, I got convinced that this &#8220;Externality of IoT Security&#8221; is rapidly becoming <strong>THE</strong> issue around IoT, and possibly the entire internet. We are deploying devices today that do not include any kind of security, because nobody cares.</p>
<p><span id="more-26296"></span></p>
<blockquote><p><span style="font-size: x-large;">We  don&#8217;t care for a variety of reasons.</span></p></blockquote>
<p>Some of us are <em>clueless</em>:</p>
<ul>
<li><strong>Some vendors</strong>. Some vendors, initially many of them, have no idea that security could be a problem. Typically, this occurs with vendors of gadgets and other devices that don&#8217;t seem to be related to security in any way. Today, such cluelessness should become uncommon, as IoT-based attacks make headlines.</li>
<li><strong>Most users</strong>. That&#8217;s one of the scariest aspects of this. If a hacker ensures that pwned devices keep working normally most of the time, the end users will most likely not even notice a problem. Most IoT devices are unattended; if they work normally, there is no reason to worry.</li>
</ul>
<p>Some of us are <em>helpless</em>:</p>
<ul>
<li><strong>Merchants</strong>. Most devices are sold by some local/online store. Don&#8217;t expect these guys to provide much help, though. I tried to ask a few questions, and the best answer I got was a pointer to the vendor&#8217;s product support page (which said nothing about security, of course).</li>
<li><strong>Some users</strong>. Some users may worry about security, but their actions are quite limited, unless they have some understanding of security and computing.</li>
</ul>
<p>Some of us <em>optimize profits</em>:</p>
<ul>
<li><strong>Builders</strong>. The device builder is often some unknown company in China or elsewhere, which builds a device and sells it to vendors that will integrate it in their offer. At best, these guys follow the spec provided to them: they are low-cost companies, they cannot afford to work otherwise.</li>
<li><strong>Some vendors</strong>. The device vendor is the company with the brand name. They may care about security because of potential liability and bad publicity, but in most cases, this remains a bad economic calculation. Adding security will cost them more than not, so they don&#8217;t.</li>
<li><strong>Users</strong>. When making buying decisions, many users (including businesses and governments) will not include security as one of the important criteria, often favoring price. That of course pushes builders and vendors to ignore security.</li>
</ul>
<p>Of course, not everybody thinks like that. Some companies include security in their priorities, or at least understand that security should be one of their priorities. This is a step forward, but they can still be a long way from secure products, because of two very common attitudes.</p>
<p>Some of us are in <em>denial</em>:</p>
<ul>
<li><strong>Vendors</strong>. Denial is often visible when an attack occurs. This may of course be part of a communication strategy, but there are two strong indicators of denial. If the communication uses &#8220;highly sophisticated&#8221; to describe the attack, or &#8220;highly unlikely&#8221; to describe its exploits, then denial is likely. It is dangerous, because the vendor may then decide to minimize the impact of its actions, whereas in reality, most attacks we se today are rather simple, and most exploits are not implemented because &#8220;bad&#8221; business models remain unclear. For instance, insulin pump vendors have been in denial. Wirelessly controlled pumps can be hacked and could be used to kill people; this is not used today, most likely because this is not a tool that they are used to (although it has many advantages), but that can change any day.</li>
<li><strong>Users</strong>. Denial is obvious for many users, who know that there is a risk and will nevertheless not take any action. An example from outside of IoT is our behavior towards passwords, which are often much weaker than what our knowledge of security issues would mandate.</li>
</ul>
<p>Some of us <em>lack expertise</em> (or don&#8217;t apply it appropriately):</p>
<ul>
<li><strong>Vendors</strong>. Some systems include security measures, together with poor design or implementation. The <a href="https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/" class="liexternal">Jeep attacks</a> became legendary, some <a href="http://www.theverge.com/2016/11/3/13507126/iot-drone-hack" class="liexternal">attacks on Philips Hue bulbs</a> have been quite sophisticated but generated more buzz. In both cases, security measures were present (firmware update, authentication, usage restrictions and more), but their implementation was not sufficiently secure.This could be a lack of expertise, a lack of judgment, or a combination. In the end, the result is the same: they got hacked.</li>
</ul>
<p>Denial and lack of expertise are different, of course. In these cases, security is not strictly considered as an externality. However, these attitudes also show an underestimation of their liability level, meaning that IoT security is not sufficiently considered as being their responsibility, and too much considered as an externality.</p>
<blockquote><p><span style="font-size: x-large;">Today, poor evaluations of responsibility levels are the main blocking point for IoT security.</span></p></blockquote>
<p>As long as most people and companies consider IoT security as somebody else&#8217;s problem or underestimate their required contribution, we will not see any significant progress. This is why externality is <strong>THE</strong> issue to be addressed today.</p>
<p>And this is no small issue. It is very easy and tempting to establish a parallel between IoT security and climate change. Climate change is an externality, and many powerful people are trying to address it. Yet, even with international treaties, it largely remains an externality for most actors. </p>
<p>IoT is not on the same scale in terms of life-threatening impact, but it is facing the same issue with similar actors. Global solutions are not going to come easy.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2016/11/21/iot-security-as-externality-cluelessness-denial-and-more/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>
