< Back to previous page

Publication

Link-time smart card code hardening

Journal Contribution - Journal Article

This paper presents a feasibility study to protect smart card software against fault-injection attacks by means of link-time code rewriting. This approach avoids the drawbacks of source code hardening, avoids the need for manual assembly writing, and is applicable in conjunction with closed third-party compilers. We implemented a range of cookbook code hardening recipes in a prototype link-time rewriter and evaluate their coverage and associated overhead to conclude that this approach is promising. We demonstrate that the overhead of using an automated link-time approach is not significantly higher than what can be obtained with compile-time hardening or with manual hardening of compiler-generated assembly code.
Journal: INTERNATIONAL JOURNAL OF INFORMATION SECURITY
ISSN: 1615-5262
Issue: 2
Volume: 15
Pages: 111 - 130
Publication year:2016
BOF-keylabel:yes
IOF-keylabel:yes
BOF-publication weight:0.1
CSS-citation score:1
Authors:National
Authors from:Higher Education
Accessibility:Open