Escolar Documentos
Profissional Documentos
Cultura Documentos
vulnerabilty;
fault;
I. INTRODUCTION:
The smart card is a plastic card with an embedded
computer chip (a processor and a memory), it is
increasingly used in different domains such as
health, social protection, communication, and
payment. So before using the smartcard or the
smartcards system, it is necessary to be sure that
the application (smartcard) responds only to
requests sent by the authorized user, ensure the
service continuity with respecting the response time
and ensure confidentiality of exchanged data. So as
in computer security, smartcard system security is
concerned by data integrity, availability of services
and confidentiality of information .The smart card
is used in different areas that are targeted by several
attackers, some ones are interested by confidential
data access, and others attack the system for
financial reasons. Their goals are not identical, but
all their attack techniques are based on the presence
of faults or vulnerabilities of the card or its system.
In order to block the attackers and resolve these
problems, we must study these attacks from
different sides, as their types, their goals, and the
system vulnerability used. In this sense, we need to
classify the attacks and their ties with
vulnerabilities. Such is the object of this paper.
The rest of this, show common smartcard flaw
characteristics and reduce the possible cases by
creation of attack classes that must contain all of
existing attacks and those that would appear later
too.
First of all and before starting the topic of attacks
classification, we must define what are the
taxonomy, vulnerability, error, faults, attacks
and then we will present some researches about
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]