Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks

Research output: Chapter in Book/Report/Conference proceedingConference contribution

103 Downloads (Pure)

Abstract

Smart cards are mostly deployed in security-critical environments in order to provide a secure and trusted access to the provisioned services. These services are delivered to a cardholder using the Service Provider's (SPs) applications on his or her smart card(s). These applications are at their most vulnerable state when they are executing. There exist a variety of runtime attacks that can circumvent the security checks implemented either by the respective application or the runtime environment to protect the smart card platform, user and/or application. In this paper, we discuss the Java Runtime Environment and a potential threat model based on runtime attacks. Subsequently, we discussed the counter-measures that can be deployed to provide a secure and reliable execution platform, along with an evaluation of their effectiveness, incurred performance-penalty and latency.
Original languageEnglish
Title of host publicationComputer Security -- ESORICS 2015
Subtitle of host publication20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II
EditorsPeter Y A Ryan, Edgar Weippl
Place of PublicationVienna, Austria
PublisherSpringer
Pages541-560
Number of pages20
ISBN (Electronic)978-3-319-24177-7
ISBN (Print)978-3-319-24176-0
DOIs
Publication statusE-pub ahead of print - 18 Nov 2015

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume9327

Keywords

  • Smart Card
  • Java Card
  • Fault Attacks
  • Combined Attacks
  • Counter-Measures
  • Java Runtime Environment

Cite this