Full Program »
Getting to know your card: Reverse-Engineering the Smart-Card Application Protocol Data Unit
Presentation 775KB |
We present REPROVE, the first automated system that reverse-engineers the low-level communication between a smart-card and a reader, deduces the card’s functionality and translates PKCS#11 cryptographic functions into communication steps. REPROVE analyzes with both standard-conforming and proprietary implementations, and does not require access to the card. To the best of our knowledge, REPROVE is the first system to address proprietary implementations and the only system that maps cryptographic functions to communication steps and on-card operations. We have evaluated REPROVE on five commercially available smart-cards and we show how essential functions to gain access to the card’s private objects and perform cryptographic functions can be compromised through reverse-engineering traces of the low-level communication.
Author(s):
Andriana Gkaniatsou
University of Edinburgh
United Kingdom
Fiona McNeill
Heriot-Watt University
United Kingdom
Alan Bundy
University of Edinburgh
United Kingdom
Graham Steel
Cryptosense
France