首页> 外文期刊>International Journal of Information Security >Link-time smart card code hardening
【24h】

Link-time smart card code hardening

机译:链接时智能卡代码强化

获取原文
获取原文并翻译 | 示例
           

摘要

This paper presents a feasibility study to protect smart card software against fault-injection attacks by means of link-time code rewriting. This approach avoids the drawbacks of source code hardening, avoids the need for manual assembly writing, and is applicable in conjunction with closed third-party compilers. We implemented a range of cookbook code hardening recipes in a prototype link-time rewriter and evaluate their coverage and associated overhead to conclude that this approach is promising. We demonstrate that the overhead of using an automated link-time approach is not significantly higher than what can be obtained with compile-time hardening or with manual hardening of compiler-generated assembly code.
机译:本文提出了通过链接时代码重写来保护智能卡软件免受故障注入攻击的可行性研究。这种方法避免了源代码强化的缺点,避免了手动汇编的需要,并且可与封闭的第三方编译器结合使用。我们在原型链接时重写器中实现了一系列食谱代码强化配方,并评估了它们的覆盖范围和相关开销,以得出该方法很有希望的结论。我们证明,使用自动链接时方法的开销不会比使用编译时强化或手动强化编译器生成的汇编代码所获得的开销高得多。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号