Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks. / Akram, Raja; Markantonakis, Konstantinos.

20th European Symposium on Research in Computer Security (ESORICS 2015). ed. / Peter Y A Ryan; Edgar Weippl. Vienna, Austria : Springer, 2015. p. 541-560.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

E-pub ahead of print

Standard

Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks. / Akram, Raja; Markantonakis, Konstantinos.

20th European Symposium on Research in Computer Security (ESORICS 2015). ed. / Peter Y A Ryan; Edgar Weippl. Vienna, Austria : Springer, 2015. p. 541-560.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Akram, R & Markantonakis, K 2015, Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks. in PYA Ryan & E Weippl (eds), 20th European Symposium on Research in Computer Security (ESORICS 2015). Springer, Vienna, Austria, pp. 541-560. https://doi.org/10.1007/978-3-319-24177-7_27

APA

Akram, R., & Markantonakis, K. (2015). Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks. In P. Y. A. Ryan, & E. Weippl (Eds.), 20th European Symposium on Research in Computer Security (ESORICS 2015) (pp. 541-560). Springer. https://doi.org/10.1007/978-3-319-24177-7_27

Vancouver

Akram R, Markantonakis K. Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks. In Ryan PYA, Weippl E, editors, 20th European Symposium on Research in Computer Security (ESORICS 2015). Vienna, Austria: Springer. 2015. p. 541-560 https://doi.org/10.1007/978-3-319-24177-7_27

Author

Akram, Raja ; Markantonakis, Konstantinos. / Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks. 20th European Symposium on Research in Computer Security (ESORICS 2015). editor / Peter Y A Ryan ; Edgar Weippl. Vienna, Austria : Springer, 2015. pp. 541-560

BibTeX

@inproceedings{3a7568c3af524aa78a83514e6660f0fd,
title = "Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks",
abstract = "Smart cards are mostly deployed in security-critical environments in order to provide a secure and trusted access to the provisioned services. These services are delivered to a cardholder using the Service Provider's (SPs) applications on his or her smart card(s). These applications are at their most vulnerable state when they are executing. There exist a variety of runtime attacks that can circumvent the security checks implemented either by the respective application or the runtime environment to protect the smart card platform, user and/or application. In this paper, we discuss the Java Runtime Environment and a potential threat model based on runtime attacks. Subsequently, we discussed the counter-measures that can be deployed to provide a secure and reliable execution platform, along with an evaluation of their effectiveness, incurred performance-penalty and latency.",
keywords = "Smart Card, Java Card, Fault Attacks, Combined Attacks, Counter-Measures, Java Runtime Environment",
author = "Raja Akram and Konstantinos Markantonakis",
year = "2015",
month = nov,
day = "18",
doi = "10.1007/978-3-319-24177-7_27",
language = "English",
isbn = "978-3-319-24176-0",
pages = "541--560",
editor = "Ryan, {Peter Y A } and Edgar Weippl",
booktitle = "20th European Symposium on Research in Computer Security (ESORICS 2015)",
publisher = "Springer",

}

RIS

TY - GEN

T1 - Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks

AU - Akram, Raja

AU - Markantonakis, Konstantinos

PY - 2015/11/18

Y1 - 2015/11/18

N2 - Smart cards are mostly deployed in security-critical environments in order to provide a secure and trusted access to the provisioned services. These services are delivered to a cardholder using the Service Provider's (SPs) applications on his or her smart card(s). These applications are at their most vulnerable state when they are executing. There exist a variety of runtime attacks that can circumvent the security checks implemented either by the respective application or the runtime environment to protect the smart card platform, user and/or application. In this paper, we discuss the Java Runtime Environment and a potential threat model based on runtime attacks. Subsequently, we discussed the counter-measures that can be deployed to provide a secure and reliable execution platform, along with an evaluation of their effectiveness, incurred performance-penalty and latency.

AB - Smart cards are mostly deployed in security-critical environments in order to provide a secure and trusted access to the provisioned services. These services are delivered to a cardholder using the Service Provider's (SPs) applications on his or her smart card(s). These applications are at their most vulnerable state when they are executing. There exist a variety of runtime attacks that can circumvent the security checks implemented either by the respective application or the runtime environment to protect the smart card platform, user and/or application. In this paper, we discuss the Java Runtime Environment and a potential threat model based on runtime attacks. Subsequently, we discussed the counter-measures that can be deployed to provide a secure and reliable execution platform, along with an evaluation of their effectiveness, incurred performance-penalty and latency.

KW - Smart Card

KW - Java Card

KW - Fault Attacks

KW - Combined Attacks

KW - Counter-Measures

KW - Java Runtime Environment

U2 - 10.1007/978-3-319-24177-7_27

DO - 10.1007/978-3-319-24177-7_27

M3 - Conference contribution

SN - 978-3-319-24176-0

SP - 541

EP - 560

BT - 20th European Symposium on Research in Computer Security (ESORICS 2015)

A2 - Ryan, Peter Y A

A2 - Weippl, Edgar

PB - Springer

CY - Vienna, Austria

ER -