Breaking Up Is Hard To Do: Modeling Security Threats for Smart Cards
Download
Report
Transcript Breaking Up Is Hard To Do: Modeling Security Threats for Smart Cards
Introduction
Architecture
Hardware
Software
Application
Security
Logical Attack
Physical Attack
Side channel Attack
Introduction
Smart card is any pocket-sized card with embedded
integrated circuits which can process data.
The first mass use of the cards was for payment in
French pay phones.
Smart card itself is a small computer.
Examples
ATM
Highway Toll cards
Student Id cards
Architecture.(Hardware)
CPU
ROM
RAM
EEPROM
Test Logic
Security Logic
I/O Interface
Architecture(Software)
Modular software design
Application separation
Popular smartcard operating system is called Java Card
and uses proven security concepts from the Java
language
The EEPROM is used similarly to a hard disk and can
contain files and directories with user and application
data.
Architecture(Software)
Command Structure
CLA: Class
INS: Instruction
P1, P2: Parameter
P3 : Length
Smart card Vs RFID
Strong security.
Minimal security.
Many security features
Single function use.
can be safely stored.
512 byte capacity.
Short distance data
exchange.
92 byte capacity. Most
of time read only.
Large distance data
exchange.
Application
Computer Security
Financial
Health care
Identification
Other
Security
Logical Attacks
Hidden Commands
Parameter poisoning
File Access
Malicious Applets
Communication Protocol
Counter Measures
Structured Design
Formal verification
Testing
Standardization of Interfaces and Application
Convergence of Java card OS
Popularity of evaluation lab
Physical Attacks
Chemical Solvents
Microscopes
Probe station
Focused Ion beam
Counter Measures
Feature size
Multi layering
Protective layering
Sensors
Bus scrambling
Glue logic
Side Channel Attacks
Power Consumption
Electromagnetic radiation
Time
Voltage
Temperature
Lights and X rays
Frequency
References
‘Advances in Smart card security’ by Marc Witteman.
‘Breaking Up Is Hard To Do: Modeling Security Threats
for Smart Cards’ By Bruce Schneier and Adam
Shostack
Thank You