Breaking Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit
Add to your list(s)
Download to your calendar using vCal
If you have a question about this talk, please contact Markus Kuhn.
Smart-Cards are considered as one of the most secure, trusted and tamper-resistant devices for performing cryptographic operations. The commonly used RSA PKCS #11 standard defines the API for cryptographic hardware such as smart-cards. Though there has been work on formally verifying the correctness of the implementation of PKCS #11 in the API level, little or none attention has been paid on the low-level protocols that are closely connected to it.
We will present REPROVE an automated tool that reverse-engineers the low-level communication between a smart-card and a reader, deduces the card’s functionalities and maps that communication to PKCS #11 functions. REPROVE is implementation practice independent and does not require access to the card nor to its API .
This talk is part of the Computer Laboratory Security Group meeting presentations series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
|