Memory Forensics of a Java Card DumpReport as inadecuate




Memory Forensics of a Java Card Dump - Download this document for free, or read online. Document in PDF available to download.

1 TAMIS - Threat Analysis and Mitigation for Information Security Inria Rennes – Bretagne Atlantique , IRISA-D4 - LANGAGE ET GÉNIE LOGICIEL 2 XLIM-DMI - DMI XLIM - XLIM 3 UNILIM - Université de Limoges

Abstract : Nowadays several papers have shown the ability to dump the EEPROM area of several Java Cards leading to the disclosure of already loaded applet and data structure of the card. Such a reverse engineering process is costly and prone to errors. Currently there are no tools available to help the process. We propose here an approach to find in the raw data obtained after a dump, the area containing the code and the data. Then, once the code area has been identified, we propose to rebuilt the original binary Cap file in order to be able to obtain the source code of the applet stored in the card.

Keywords : Java Card Memory Forensics Reverse Engineering Disassembler Index of coincidence





Author: Jean-Louis Lanet - Guillaume Bouffard - Rokia Lamrani - Ranim Chakra - Afef Mestiri - Mohammed Monsif - Abdellatif Fandi -

Source: https://hal.archives-ouvertes.fr/



DOWNLOAD PDF




Related documents