USENIX Technical Program - Abstract - Smartcard 99
Design Principles for Tamper-Resistant Smartcard Processors
Oliver Kömmerling, Advanced Digital Security Research; Markus G. Kuhn, University of Cambridge
Abstract
We describe techniques for extracting protected software and data
from smartcard processors. This includes manual microprobing, laser
cutting, focused ion-beam manipulation, glitch attacks, and power
analysis. Many of these methods have already been used to compromise
widely-fielded conditional-access systems, and current smartcards
offer little protection against them. We give examples of low-cost
protection concepts that make such attacks considerably more
difficult.
- View the full text of this paper in
HTML form and
PDF form.
- If you need the latest Adobe Acrobat Reader, you can download it from Adobe's site.
- To become a USENIX Member, please see our Membership Information.
|