RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Reversing Bytecode of Obfuscated Java Based Smart Card Using Side Chanel Analysis

        Mohammed Amine Kasmi,Mostafa Azizi,Jean-Louis Lanet 보안공학연구지원센터 2015 International Journal of Security and Its Applicat Vol.9 No.11

        Side-channel Analysis (SCA) has become a reliable method for cryptanalysts to break cryptographic algorithms. Recently, SCA is used to reverse engineer the applet bytecodes on Java based smart cards. In addition of Power Analysis, other techniques of SCA exist, such as Electromagnetic Analysis (EMA). EMA of smart cards is a powerful technique that allows extracting information about the executed bytecode as well as about the processed data. In our work, we study the possibility to apply reverse engineering upon a Java Card applet in which the virtual machine is obfuscated by using SCA techniques. Even if this process of bytecode obfuscation is an effective way to prevent execution of an arbitrary and malicious bytecode, we believe that it can be systematically bypassed regardless the level of the platform encryption under the reverse engineering trails. In this paper, we present a methodology that could be used to find out the encryption key of the obfuscation process using the reverse engineering process through SCA. To perform reverse engineering, a white box approach providing access to the Java Card is needed in a learning stage, and then the technique used can be used on a black box approach where the code of applications is not accessible at the matching stage.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼