University of Birmingham > Talks@bham > Computer Security Seminars > Getting to know your smart-card: Reverse-Engineering the Low Level Communication Layer

Getting to know your smart-card: Reverse-Engineering the Low Level Communication Layer

Add to your list(s) Download to your calendar using vCal

If you have a question about this talk, please contact Gurchetan Grewal.

Smart-cards are considered to be one of the most secure, tamper-resistant, and trusted devices for implementing cryptographic operations. The commonly used RSA PKCS #11 standard defines the Application Programming Interface for cryptographic devices such as smart-cards. Though there has been work on attacking and fixing RSA PKCS #11 in the API level, little attention has been paid to the low-level protocols that implement it. We will present REPROVE , the first automated tool that reverse-engineers the low-level communication of a smart-card and a reader, deduces the card’s operations and translates PKCS #11 functions to communication steps. REPROVE is implementation practice independent and does not require access to the card’s code.

This talk is part of the Computer Security Seminars series.

Tell a friend about this talk:

This talk is included in these lists:

Note that ex-directory lists are not shown.

 

Talks@bham, University of Birmingham. Contact Us | Help and Documentation | Privacy and Publicity.
talks@bham is based on talks.cam from the University of Cambridge.