Transcript Smart cards

Smart cards
a fascinating and fruitful adventure
Nguyen Quang Huy
Gemalto Technology & Innovation
Smart Cards in the our life
 Secure transaction (banking, pay-TV)
 Telecom (SIM/USIM/RUIM, M2M,
convergence, M-TV, M-banking, Mticket)
 Control Access (physical and logical resource)
 E-citizen (e-passport, e-ID, e-Heath, e-driving license, ..)
2
Smart Card HW
25 mm2
 No internal timer, battery
 No keyboard, display, network interface
 Current generation





µ-processor: 16-bits, <=10MHz
RAM: 4K
ROM: 100K for code storage
E2PROM (105 updates ): 64K for data storage
I/O: serial (9600 bps),
– Contactless protocols: MiFare, FeliCa, Calypso
 Next generation
 µ-processor: 32-bits, up to 100MHz
 Flash memory: more durable and more rapid
 I/O: USB (12 Mbps)
– Contactless open protocols: NFC, ZigBee
3
Smart Card SW
 Proprietary architecture
 Undisclosed specification
 Tedious application development
 Closed configuration: no application can be added after issuance
 Open architecture
 Open specification
 High-level programming languages
 Post-issuance applications are available
 Some open architectures




Java Card
MULTOS
.NET Card
Basic Card
4
Example: Java Card
 Introduced by Schlumberger in 1996
 Leading open multi-applicative architecture
 >5 billions Java-embedded cards issued
 Applications (applets) developed in Java
JC Firewall
I/O command
Card
Manager
Applet 1
API in Java
Java Card Virtual Machine
Operating System
Integrated Circuit
5
Applet 2
Native
API
Security threats
 No battery
 Card tearing (or power failure ) may cause inconsistency data
 No internal timer
 Logging for post-mortem analysis is not possible
 No keyboard, display, network device  secure usage environment
 Payment terminals (POS and ATM): security certification
 Security of PC and handset: keyboard logger, false display (phishing), etc
 Contactless interface
 Cardholder is not aware of malicious actions
 Physically owned by attackers
 Vulnerable to both logical and physical attacks
6
Attacks
 Logical attacks: use I/O commands to exploit SW vulnerabilities
 buffer overflow, type confusion, covert channels, protocol attacks, etc
 Physical attacks: use physical phenomenon to exploit SW/HW
vulnerabilities
 Invasive attacks: destructive and require specific logistics
 HW reverse-engineering; disabling HW security features, etc
 Non invasive attacks: affordable logistics
– Side-channel: use the emitted signals (power consumption, execution time) to
guess the secret (keys, PIN)
 Execution signature (E2PROM update, DES rounds, etc) may leak secret
– Fault-injection attacks: use physical means (infrared heat, laser, X-ray) to flip
some bits in the memory
 Modify code and runtime control flow, data: the consequence is hardly
predictable
 Combined attacks
7
Counter-measures and beyond
 Detection
 HW: (shield-removal, temperature, frequency, laser, light) sensors
 SW: checksum, fault-trap
 Protection
 HW: memory/bus encryption, redundancy, error-correcting code
 SW: transaction mechanism (anti-tearing), random noise, protection of control flow
 Auditing
 HW: security registers
 SW: fault-counters, security exception
 Reaction
 Muting (infinite loop) and clearing RAM
No counter-measure is perfect
Trade-off between security and performance (tender eligibility criterion)
 Use of mathematical techniques: formal methods
8
Mathematically proven
security assurances
9
Vietnam: smart card deployment
 Mobile telecom
 Low-end cards: <=64K EEPROM
 Banking
 Small-scale migrations to EMV standard: VP Bank, VCB, etc
 Online banking (secure reader/authentication server): VCB
 Why the banks are not keen on using smart cards ?
– Cards mainly used for ATM withdrawal: rare (offline) POS payment
 fraud is limited
– Card holders are usually paying for the fraud !
– Insfratructure cost for a migration (ATM, POS, servers, etc)
 E-government
 e-passport project (since 2006)
10
Dosmetic industry
 Small market implies small players
 Few smart cards manufacturers
 MK Technology JSC: 20 milions smart cards delivered in 2008
 Main products: SIM, USIM, RUIM
– Sale representative of foreign products
 Dosmetic share in final products
– Card personalization for final clients
– A first Vietnamese smart card OS ? MKCos (Sao Khue 2008)
 Even fewer application developers
 Vietnamizing imported applications
11
Joining the adventure
 Expanding dosmetic market by SIM-based attractive
applications e.g.,
 M-payment, online payment
 Value-added applications on mobile network
 M-ticket for public transport
 Making E-Government come true
 Healthcare card, ID-card, etc
 Education/Training
 More training courses for
– embeded programming: lucrative outsourcing market
– security engineering: go beyond anti-virus
 Support of overseas experts
 Enterprising
 Win-win JV with foreign partners to learn technology
12