To: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Smartcard Hacking Paper X-URL: http://www.cl.cam.ac.uk/~mgk25/ Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: quoted-printable Date: Sat, 29 May 1999 17:07:09 +0100 From: Markus Kuhn <[EMAIL PROTECTED]> Message-Id: <[EMAIL PROTECTED]> A recently published paper that I guess you might find quite interesting because it gives detailed information on the microprobing techniques used by pay-TV hackers to extract protected software and keys is: Oliver K=F6mmerling, Markus G. Kuhn: Design Principles for Tamper-Resistant Smartcard Processors. Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard '99), Chicago, Illinois, USA, May 10-11, 1999, USENIX Association, pp. 9-20, ISBN 1-880446-34-0. = http://www.cl.cam.ac.uk/~mgk25/sc99-tamper.pdf (full paper, 600 k= b) http://www.cl.cam.ac.uk/~mgk25/sc99-tamper-slides.pdf (more photos, 4 Mb= ) You can also order the full above USENIX conference proceedings for (I think) 40 USD from <http://www.usenix.org/publications/ordering/>. You'll find in it many other interesting recent papers on smartcards, for instance the one by people from Motorola and the University of Chicago on power analysis attacks against DES implementations in smartcards, or the one from Univ. of Michigan on mounting an ISO 7816-4 smartcard as a Unix filesystem. Markus -- = Markus G. Kuhn, Computer Laboratory, University of Cambridge, UK Email: mkuhn at acm.org, WWW: <http://www.cl.cam.ac.uk/~mgk25/> *************************************************************** Linux Smart Card Developers - M.U.S.C.L.E. (Movement for the Use of Smart Cards in a Linux Environment) http://www.linuxnet.com/smartcard/index.html ***************************************************************