![]() |
![]() |
University of Birmingham > Talks@bham > Computer Security Seminars > Getting to know your smart-card: Reverse-Engineering the Low Level Communication Layer
Getting to know your smart-card: Reverse-Engineering the Low Level Communication LayerAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Gurchetan Grewal. Smart-cards are considered to be one of the most secure, tamper-resistant, and trusted devices for implementing cryptographic operations. The commonly used RSA PKCS #11 standard defines the Application Programming Interface for cryptographic devices such as smart-cards. Though there has been work on attacking and fixing RSA PKCS #11 in the API level, little attention has been paid to the low-level protocols that implement it. We will present REPROVE , the first automated tool that reverse-engineers the low-level communication of a smart-card and a reader, deduces the card’s operations and translates PKCS #11 functions to communication steps. REPROVE is implementation practice independent and does not require access to the card’s code. This talk is part of the Computer Security Seminars series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsBeverley Glover Electromagnetic Communications and Sensing Research Seminar Series Centre for Computational Biology Seminar SeriesOther talksLife : it’s out there, but what and why ? Hunt for an Earth-twin TBA Wave turbulence in the Schrödinger-Helmholtz equation TBC TBA |