usenix conference policies
Design Principles for Tamper-Resistant Smartcard Processors
Abstract:
We describe techniques for extracting protected software and data from smartcard processors. This includes manual microprobing, laser cutting, focused ion-beam manipulation, glitch attacks, and power analysis. Many of these methods have already been used to compromise widely-fielded conditional-access systems, and current smartcards offer little protection against them. We give examples of low-cost protection concepts that make such attacks considerably more difficult.
BibTeX
@inproceedings {271706,
author = {Oliver K{\"o}mmerling and Markus G. Kuhn},
title = {Design Principles for {Tamper-Resistant} Smartcard Processors},
booktitle = {USENIX Workshop on Smartcard Technology (Smartcard 99)},
year = {1999},
address = {Chicago, IL},
url = {https://www.usenix.org/conference/usenix-workshop-smartcard-technology/design-principles-tamper-resistant-smartcard},
publisher = {USENIX Association},
month = may
}
author = {Oliver K{\"o}mmerling and Markus G. Kuhn},
title = {Design Principles for {Tamper-Resistant} Smartcard Processors},
booktitle = {USENIX Workshop on Smartcard Technology (Smartcard 99)},
year = {1999},
address = {Chicago, IL},
url = {https://www.usenix.org/conference/usenix-workshop-smartcard-technology/design-principles-tamper-resistant-smartcard},
publisher = {USENIX Association},
month = may
}
connect with us