To: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Smartcard Hacking Paper
X-URL: http://www.cl.cam.ac.uk/~mgk25/
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: quoted-printable
Date: Sat, 29 May 1999 17:07:09 +0100
From: Markus Kuhn <[EMAIL PROTECTED]>
Message-Id: <[EMAIL PROTECTED]>

A recently published paper that I guess you might find quite interesting
because it gives detailed information on the microprobing techniques
used by pay-TV hackers to extract protected software and keys is:

  Oliver K=F6mmerling, Markus G. Kuhn: Design Principles for
  Tamper-Resistant Smartcard Processors. Proceedings of the
  USENIX Workshop on Smartcard Technology (Smartcard '99),
  Chicago, Illinois, USA, May 10-11, 1999, USENIX Association,
  pp. 9-20, ISBN 1-880446-34-0. =


http://www.cl.cam.ac.uk/~mgk25/sc99-tamper.pdf         (full paper, 600 k=
b)
http://www.cl.cam.ac.uk/~mgk25/sc99-tamper-slides.pdf  (more photos, 4 Mb=
)

You can also order the full above USENIX conference proceedings for (I
think) 40 USD from <http://www.usenix.org/publications/ordering/>.
You'll find in it many other interesting recent papers on smartcards,
for instance the one by people from Motorola and the University of
Chicago on power analysis attacks against DES implementations in
smartcards, or the one from Univ. of Michigan on mounting an ISO 7816-4
smartcard as a Unix filesystem.

Markus

-- =

Markus G. Kuhn, Computer Laboratory, University of Cambridge, UK
Email: mkuhn at acm.org,  WWW: <http://www.cl.cam.ac.uk/~mgk25/>

***************************************************************
Linux Smart Card Developers - M.U.S.C.L.E.
(Movement for the Use of Smart Cards in a Linux Environment)
http://www.linuxnet.com/smartcard/index.html
***************************************************************

Reply via email to