FR2993380B1 - Procede pour proteger une carte a puce contre une attaque physique destinee a modifier le comportement logique d'un programme fonctionnel - Google Patents
Procede pour proteger une carte a puce contre une attaque physique destinee a modifier le comportement logique d'un programme fonctionnel Download PDFInfo
- Publication number
- FR2993380B1 FR2993380B1 FR1256618A FR1256618A FR2993380B1 FR 2993380 B1 FR2993380 B1 FR 2993380B1 FR 1256618 A FR1256618 A FR 1256618A FR 1256618 A FR1256618 A FR 1256618A FR 2993380 B1 FR2993380 B1 FR 2993380B1
- Authority
- FR
- France
- Prior art keywords
- program
- functional program
- protecting
- functional
- modifying
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- PWPJGUXAGUPAHP-UHFFFAOYSA-N lufenuron Chemical compound C1=C(Cl)C(OC(F)(F)C(C(F)(F)F)F)=CC(Cl)=C1NC(=O)NC(=O)C1=C(F)C=CC=C1F PWPJGUXAGUPAHP-UHFFFAOYSA-N 0.000 title 1
- 230000006399 behavior Effects 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1256618A FR2993380B1 (fr) | 2012-07-10 | 2012-07-10 | Procede pour proteger une carte a puce contre une attaque physique destinee a modifier le comportement logique d'un programme fonctionnel |
US14/413,860 US10148671B2 (en) | 2012-07-10 | 2013-07-08 | Method for protecting a chip card against a physical attack intended to modify the logical behaviour of a functional program |
PCT/EP2013/064368 WO2014009307A1 (fr) | 2012-07-10 | 2013-07-08 | Procédé pour protéger une carte à puce contre une attaque physique destinée à modifier le comportement logique d'un programme fonctionnel |
EP13735012.0A EP2873021A1 (fr) | 2012-07-10 | 2013-07-08 | Procédé pour protéger une carte à puce contre une attaque physique destinée à modifier le comportement logique d'un programme fonctionnel |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1256618A FR2993380B1 (fr) | 2012-07-10 | 2012-07-10 | Procede pour proteger une carte a puce contre une attaque physique destinee a modifier le comportement logique d'un programme fonctionnel |
FR1256618 | 2012-07-10 |
Publications (2)
Publication Number | Publication Date |
---|---|
FR2993380A1 FR2993380A1 (fr) | 2014-01-17 |
FR2993380B1 true FR2993380B1 (fr) | 2020-05-15 |
Family
ID=47624180
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
FR1256618A Active FR2993380B1 (fr) | 2012-07-10 | 2012-07-10 | Procede pour proteger une carte a puce contre une attaque physique destinee a modifier le comportement logique d'un programme fonctionnel |
Country Status (4)
Country | Link |
---|---|
US (1) | US10148671B2 (fr) |
EP (1) | EP2873021A1 (fr) |
FR (1) | FR2993380B1 (fr) |
WO (1) | WO2014009307A1 (fr) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR3098319A1 (fr) * | 2019-07-05 | 2021-01-08 | Commissariat à l'énergie atomique et aux énergies alternatives | Procédé d'exécution d'un code binaire d'une fonction sécurisée par un microprocesseur |
US11563765B2 (en) * | 2020-04-10 | 2023-01-24 | AttackIQ, Inc. | Method for emulating a known attack on a target computer network |
CN118158679A (zh) * | 2024-03-25 | 2024-06-07 | 中国人民解放军61660部队 | 基于基带攻击的无线信号侦听方法 |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3950589B2 (ja) * | 1998-08-28 | 2007-08-01 | キヤノン株式会社 | 情報処理装置、プログラム更新方法および記憶媒体 |
FR2785422B1 (fr) | 1998-10-29 | 2000-12-15 | Schlumberger Ind Sa | Dispositif et procede pour la securisation d'un circuit integre |
US6591393B1 (en) * | 2000-02-18 | 2003-07-08 | Hewlett-Packard Development Company, L.P. | Masking error detection/correction latency in multilevel cache transfers |
JP3653449B2 (ja) * | 2000-06-15 | 2005-05-25 | シャープ株式会社 | 不揮発性半導体記憶装置 |
FR2841015A1 (fr) * | 2002-06-18 | 2003-12-19 | St Microelectronics Sa | Controle d'execution d'un programme |
EP1383047A1 (fr) * | 2002-07-18 | 2004-01-21 | Cp8 | Procédé de sécurisation de l'exécution d'un programme contre des attaques par rayonnement ou autres |
NO324607B1 (no) * | 2003-11-24 | 2007-11-26 | Thin Film Electronics Asa | Fremgangsmate for a betjene et datalagringsapparat som benytter passiv matriseadressering |
US7945958B2 (en) * | 2005-06-07 | 2011-05-17 | Vmware, Inc. | Constraint injection system for immunizing software programs against vulnerabilities and attacks |
US7646636B2 (en) * | 2007-02-16 | 2010-01-12 | Mosaid Technologies Incorporated | Non-volatile memory with dynamic multi-mode operation |
US10360143B2 (en) * | 2010-07-01 | 2019-07-23 | Qualcomm Incorporated | Parallel use of integrated non-volatile memory and main volatile memory within a mobile device |
-
2012
- 2012-07-10 FR FR1256618A patent/FR2993380B1/fr active Active
-
2013
- 2013-07-08 US US14/413,860 patent/US10148671B2/en active Active
- 2013-07-08 EP EP13735012.0A patent/EP2873021A1/fr not_active Withdrawn
- 2013-07-08 WO PCT/EP2013/064368 patent/WO2014009307A1/fr active Application Filing
Also Published As
Publication number | Publication date |
---|---|
FR2993380A1 (fr) | 2014-01-17 |
WO2014009307A1 (fr) | 2014-01-16 |
EP2873021A1 (fr) | 2015-05-20 |
US20150180882A1 (en) | 2015-06-25 |
US10148671B2 (en) | 2018-12-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016003820A3 (fr) | Système et procédés pour instructions d'opérande à largeur extensible | |
DE602005016758D1 (de) | Speicherkarte, Steuerverfahren für Speicherkarte, Zugriffssteurungsverfahren für Speicherkarte and zugehörige Computerprogramme | |
RU2017102898A (ru) | Изменение размера и размещение окон приложений на основе областей | |
WO2007004219A3 (fr) | Systeme, dispositif et procede permettant de verifier qu'un code est execute par un processeur | |
SG10201407589UA (en) | Systems and methods for security verification in electronic learning systems and other systems | |
MY176723A (en) | Data processing apparatus and method using secure domain and less secure domain | |
WO2013093706A3 (fr) | Interfaces utilisateur et appareil et procédés associés | |
RU2016109436A (ru) | Селективное обеспечение соблюдения целостности кода, обеспечиваемое менеджером виртуальной машины | |
MX341086B (es) | Sistema operativo de contraseña, aparato de contraseña y metodo generador de supercontraseña. | |
US20140270258A1 (en) | Apparatus and method for executing object using voice command | |
WO2007078877A3 (fr) | Pages cachees morcelees | |
FR2993380B1 (fr) | Procede pour proteger une carte a puce contre une attaque physique destinee a modifier le comportement logique d'un programme fonctionnel | |
ATE532132T1 (de) | Steuergerät für ein fahrzeug und verfahren für eine datenaktualisierung für ein steuergerät für ein fahrzeug | |
JP2017510000A5 (fr) | ||
US20160103538A1 (en) | Electronic device and access control method | |
JP2014010549A5 (fr) | ||
EP2637124A3 (fr) | Procédé pour la mise en 'uvre de sécurité de mémoire non volatile | |
WO2014028663A3 (fr) | Schéma de protection pour code intégré | |
Alenezi et al. | Evaluating software metrics as predictors of software vulnerabilities | |
EP2733613A3 (fr) | Dispositif de commande et programme | |
US20170139584A1 (en) | User account switching interface | |
JP2014063472A5 (fr) | ||
CN103870745A (zh) | 电子设备和安全启动电子设备的方法 | |
WO2007078959A3 (fr) | Orientation d'accès à une zone de code smm (mode de gestion système) | |
RU2019114199A (ru) | Разделенный на слои выбор контента |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PLFP | Fee payment |
Year of fee payment: 5 |
|
PLFP | Fee payment |
Year of fee payment: 6 |
|
PLFP | Fee payment |
Year of fee payment: 7 |
|
PLFP | Fee payment |
Year of fee payment: 8 |
|
PLFP | Fee payment |
Year of fee payment: 9 |
|
PLFP | Fee payment |
Year of fee payment: 10 |
|
PLFP | Fee payment |
Year of fee payment: 11 |
|
CA | Change of address |
Effective date: 20230220 |
|
CD | Change of name or company name |
Owner name: IDEMIA IDENTITY & SECURITY FRANCE, FR Effective date: 20230220 |
|
PLFP | Fee payment |
Year of fee payment: 12 |
|
PLFP | Fee payment |
Year of fee payment: 13 |