This HTML5 document contains 44 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n21http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n14http://purl.org/net/nknouf/ns/bibtex#
n5http://localhost/temp/predkladatel/
n8http://linked.opendata.cz/resource/domain/vavai/projekt/
n7http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n15http://linked.opendata.cz/ontology/domain/vavai/
n20https://schema.org/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n16http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216224%3A14330%2F10%3A00044029%21RIV11-MSM-14330___/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n11http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n19http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n10http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n4http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n18http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n9http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n6http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216224%3A14330%2F10%3A00044029%21RIV11-MSM-14330___
rdf:type
skos:Concept n15:Vysledek
dcterms:description
Smart card platforms like Java Card or .NET allow to implement portable applications that can be run on different smart card hardware. The resulting overall security of the applet is strongly dependent on the implementation of the smart card operating system, related libraries, as well as physical resistance and information leakage of the underlying hardware. Defenses implementable on the source code level for later case might exist, but such a situation is unfavorable for applet developer as multiple versions of applet must be maintained to support a wider range of smart cards (although all providing Java Card platform). In this paper we describe several practical attacks on modern smart cards, discuss possible defenses and propose a general framework for automatic replacement of vulnerable operations by safe equivalents. A code strengthening constructions can be also automatically inserted. Practical implementation and examples of usage are presented and discussed. Smart card platforms like Java Card or .NET allow to implement portable applications that can be run on different smart card hardware. The resulting overall security of the applet is strongly dependent on the implementation of the smart card operating system, related libraries, as well as physical resistance and information leakage of the underlying hardware. Defenses implementable on the source code level for later case might exist, but such a situation is unfavorable for applet developer as multiple versions of applet must be maintained to support a wider range of smart cards (although all providing Java Card platform). In this paper we describe several practical attacks on modern smart cards, discuss possible defenses and propose a general framework for automatic replacement of vulnerable operations by safe equivalents. A code strengthening constructions can be also automatically inserted. Practical implementation and examples of usage are presented and discussed.
dcterms:title
Automatic source code transformations for strengthening practical security of smart card applications Automatic source code transformations for strengthening practical security of smart card applications
skos:prefLabel
Automatic source code transformations for strengthening practical security of smart card applications Automatic source code transformations for strengthening practical security of smart card applications
skos:notation
RIV/00216224:14330/10:00044029!RIV11-MSM-14330___
n3:aktivita
n4:P
n3:aktivity
P(LA09016)
n3:dodaniDat
n6:2011
n3:domaciTvurceVysledku
n7:7347782 n7:9095128 n7:3636372
n3:druhVysledku
n9:D
n3:duvernostUdaju
n19:S
n3:entitaPredkladatele
n16:predkladatel
n3:idSjednocenehoVysledku
248204
n3:idVysledku
RIV/00216224:14330/10:00044029
n3:jazykVysledku
n10:eng
n3:klicovaSlova
smart card; power analysis; source code analysis; platform security
n3:klicoveSlovo
n11:power%20analysis n11:smart%20card n11:platform%20security n11:source%20code%20analysis
n3:kontrolniKodProRIV
[8518EDFEC0ED]
n3:mistoKonaniAkce
Maxičky
n3:mistoVydani
Plzeň
n3:nazevZdroje
Sborník příspěvků z 36. konference EurOpen.CZ
n3:obor
n18:IN
n3:pocetDomacichTvurcuVysledku
3
n3:pocetTvurcuVysledku
3
n3:projekt
n8:LA09016
n3:rokUplatneniVysledku
n6:2010
n3:tvurceVysledku
Lorenc, Václav Smolka, Tobiáš Švenda, Petr
n3:typAkce
n21:CST
n3:zahajeniAkce
2010-05-16+02:00
s:numberOfPages
118
n14:hasPublisher
EurOpen.CZ
n20:isbn
978-80-86583-19-8
n5:organizacniJednotka
14330