University of Cambridge > Talks.cam > Computer Laboratory Security Group meeting presentations > Breaking Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit

Breaking Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit

Add to your list(s) Download to your calendar using vCal

If you have a question about this talk, please contact Markus Kuhn.

This talk has been canceled/deleted

Smart-Cards are considered as one of the most secure, trusted and tamper-resistant devices for performing cryptographic operations. The commonly used RSA PKCS #11 standard defines the API for cryptographic hardware such as smart-cards. Though there has been work on formally verifying the correctness of the implementation of PKCS #11 in the API level, little or none attention has been paid on the low-level protocols that are closely connected to it. We will present REPROVE an automated tool that reverse-engineers the low-level communication between a smart-card and a reader, deduces the card’s functionalities and maps that communication to PKCS #11 functions. REPROVE is implementation practice independent and does not require access to the card nor to its API .

This talk is part of the Computer Laboratory Security Group meeting presentations series.

Tell a friend about this talk:

This talk is included in these lists:

This talk is not included in any other list

Note that ex-directory lists are not shown.

 

© 2006-2024 Talks.cam, University of Cambridge. Contact Us | Help and Documentation | Privacy and Publicity