What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10...

84
0/83 What is Smart Cards? 2010.04.15 Korea Smart Card Co. Jae Gwan Park [email protected]

Transcript of What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10...

Page 1: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

0/83

What is Smart Cards?

2010.04.15

Korea Smart Card Co.

Jae Gwan Park

[email protected]

Page 2: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

1/83

• Exploded view of a Smart Card

• Architecture of a Smart Card

• Memory Cards

• Microprocessor Cards

• Contactless Cards

1. What is a smart card?

Page 3: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

2/83

•Micro Module•8 or 6 Contacts

•Integrated Circuit

•Plastic Card

•Free Access Memory

•Protected Memory

•Microprocessor

•Contact Smart Card

•Contactless Smart Card

•ABS, PVC, Polycarbonate

•Hologram

•Brand Stamp

•Mag. Stripe

•Chip with ante

nna

Exploded view of a Smart Card1. What is a smart card?

Page 4: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

3/83

•C1 •C5

•C2 •C6

•C3 •C7

•C4 •C8

•C1: VCC(전압공급)

•C2: RST(리셋신호)

•C3: CLK(클럭신호)

•C4: Reserved

•C5: GND(접지)

•C6: Reserved

•C7: I/O(입출력)

•C8: Reserved•Module

•Chip

•Bonding Pads

•Address Data Bus

•I/O •CPU •NPU •RAM

•ROM•EEPROM

•Charge Pump

•Bonding Pads

•IC Chip

CARD BODY (Back)

•adhesive foil

•contact surface

•wire bond

•gluing surface

•Microprocessor (Chip)

•card body

•empty space

•epoxy

•Antenna Coil

Chip

Antenna

Module (Contacts)

CARD BODY (Front)

•Physical Architecture

Exploded view of a Smart Card1. What is a smart card?

Page 5: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

4/83

Contact Smart Card Standards1. What is a smart card?

• ISO 7816-1: Physical characteristics

• ISO 7816-2: Dimension & location of contacts

• ISO 7816-3: Electronic signal & transmission protocol

• ISO 7816-4: Interindustry commands

• ISO 7816-5: Resistration system for application in IC card

• ISO 7816-6: Interindustry data elements

• ISO 7816-7: Interindustry commands for Structured

Card Query Languge(SCQL)

• ISO 7816-8: Security architecture and related commands

Page 6: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

5/83

•ISO 7816 Standards

•The Very Big Bank

•1234 5678 9012 3456

•Rich Wealthy

•NET

•ISO 7816-1

•Dimensions and

•physical constraints•ISO 7816-2

•Electrical signals

•ISO 7816-3

•Communication

•protocole

•ISO 7816-4 ...

•Memory management and

•inter industry commands

Contact Smart Card Standards1. What is a smart card?

Page 7: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

6/83

• Free Access Memory card

•EEPROM :

•Application Data

•Wired Logic:

•Addressing

• a Memory Card can be compared to a Floppy disk...

Memory Card Architecture1. What is a smart card?

Page 8: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

7/83

•EPROM

•Security Info.

•Fuses

•Wired Logic :

•Addressing,

•Security

•EEPROM,

•Application Data

•EPROM :

•Security Info.•Wired Logic :

•Addressing,

•Security

•EEPROM :

•Abaccus counter

•Fuses

•EPROM

•Security Info.

•Fuses

•Wired Logic

•Addressing,

•Security

•EEPROM,

•Application Data

•Keys

• Protected Memory Card

Memory Card Architecture1. What is a smart card?

Page 9: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

8/83

•Clock •Reset

•Input /

Output

•CPU

•RAM :

•Scratch Pad

•ROM,

•Operating system•EEPROM,

•Application Memory

•EEPROM :

•Application Mem

ory

•ROM :

•Operating Syste

m

•a microprocessor card can be compared to a computer !!

1. What is a smart card? Microprocessor Card Architecture

Page 10: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

9/83

• CPU 6805/8051/H8/RISC

• 8 bits/16 bits/32 bits

• 3,57 / 5Mhz

• 5 / 3Volts

1. What is a smart card? Processing unit : CPU

Page 11: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

10/83

• RAM = Random Access Memory

• 128 up to 2 K bytes (Stack included)

• Scratch pad

• Checked and reseted after reset

1. What is a smart card? Volatile memory : RAM

Page 12: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

11/83

• ROM (Read Only Memory)

• EEPROM (Electrically Erasable and Programable Read Only Memory)

•ROM,

•Operating system•EEPROM,

•Application Memory

1. What is a smart card? Non Volatile memories

Page 13: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

12/83

• Operating System

– I/O protocol

– Chip handler

– External commands

– Memory management

– Authentication algorithms

• 6 up to 56k bytes

•ROM,

•Operating system•EEPROM,

•Application Memory

1. What is a smart card? ROM

Page 14: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

13/83

• Application memory

• Specific file architecture

• Data informations

• Softmask

• Data OS

• 1 up to 64 K bytes

1. What is a smart card? EEPROM

Page 15: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

14/83

• Light

• Temperature

• Passivation

• Clock

• Vcc

1. What is a smart card? Security componet

Page 16: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

15/83

•Plastic Card•Integrated Circuits

• o Power circuit

• o Analog I/O circuit

• o Data storage and processing

•Power transm

ission

•coil

•Data

•transmission

•coil or plates

•Smart Transportation Authority

•1234 5678 9012 3456

•City Dweller

•Smart Transportation Authority

•1234 5678 901

•City Dweller

1. What is a smart card? Contactless Cards

Page 17: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

16/83

•Smart card functions

•Mechanical strength•Data security

•Data storage •Data processing

2. How does a smart card work? Main Functions of a Smart Card

Page 18: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

17/83

• 1-Token card

– Read / write / erease data in memory

– Protect data (ex: serial number storage)

– Process certificates: Authentication,...

– Count units : Abaccos

• 2- Microprocessor cards

– Read / write / erease data

– Identify the card: component,...

– Manage Memory

– Manage Files (PC): multi-aplication cards,...

– Protect data (ex: secret key storage )

– Encrypt data( ex: financial transactions )

– Authenticate ( ex : card owner with PIN)

2. How does a smart card work? Functions of a Smart Card

Page 19: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

18/83

•READER CARD

•X select •Y s

ele

c

t

•Power, Clock

RAZ

•Messages

•Electronics

• +

•Connector

•I/O

lo

gic

2. How does a smart card work? Read and Write in a token Card

Page 20: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

19/83

• Plastic Cards

• Modules

• Embedding & Test

• Personalization

3. Manufacturing Process Manufacturing

Page 21: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

20/83

• ABS / ABS modified

• PVC

• Polycarbonate

• Hologram

• Brand Stamp

• Magnetic stripe

• Printing

3. Manufacturing Process Card Body

Page 22: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

21/83

• 8 or 6 contacts

– 1. Vcc

– 2. Reset

– 3. Clock

– 4. (Optional)

– 5. Ground

– 6. (optional)

– 7. Input/Output

– 8. (optional)

• Metal:Tungsten, Gold

3. Manufacturing Process Micro module

Page 23: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

22/83

•Sky High Transit

•Sky High Transit

•Sky High Transit

•Sky High Transit

•Punching

•Sky High Transit

•Sheet Printing

•Graphic data

•(Films, disk, syquest...)•Plastic sheet: PVC

3. Manufacturing Process Plastic Card Printing

Page 24: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

23/83

•Motorola, Atmel

•Texas Instruments

•SGS Thomson

•Siemens, Hitachi

•Probing

•Dicing

•Wafer

•Die

•Coating•Module

•Bonding

3. Manufacturing Process Module Assembly Process

Page 25: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

24/83

•1.Punch or mold

•Sky High Transit

•2. Mill

•3. Insert

•Sky High Transit•1234

•Super

•Glue

•Sky High Credit•1234

•1234 5678 9012 3456

•John Doe - Exp 13/999

•4. Test - Serialize

•5. Personalize

3. Manufacturing Process Embedding & Test

Page 26: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

25/83

•Customer ID file

•Microprocessor car

d encoding

•Final Inspec

tion and ship

ping

•Embossing

•Encoding

•Black box

•Personal ID mailing

•Mag tape

• Stripe Card

•Mag tape Sm

art Card

•Bank card (mP+magstripe) Personalization Process

3. Manufacturing Process Personalization Process

Page 27: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

26/83

•Chip manufacturer•Motorola, Siemens...

Main industrial actors in the smart card environment

•Printer •Embedder •Card supplier

•Card issuer:•Bank, Telecom,..

•Card Owner

•Service Provider

• , FDR

•Terminal manufacturer• , Verifone, L&G,...

•Processor

3. Manufacturing Process Industrial Actors

Page 28: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

27/83

• Benefits of the Smart Card

• Cards technology features

• Applications

• Exemple of Applications Architectures

4. Applications of the smart card Industrial Actors

Page 29: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

28/83

• Portable and mobile: identify the owner

• Convenient and flexible

• Protected and secure

• Good mechanical strength

• Proven technology with good reliability

• Can store and process data (personal, digital certificates,..)

• Cost effective

• Branded

• Innovative

•Why a smart card ?

4. Applications of the smart card

Page 30: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

29/83

•Access control

•network security

•Digital Cell. Phones

•Health Ca

re

•Mass Transit

•Ticketless Tr

aveling

•Electronic

•Commerce

•Electronic Purse•Loyalty

•Ultra Mall

•Rewards

•Pay TV•Access Control

•Parking

•The Very Big Bank

•Rich Wealthy

•NET

•1234 5678 9012 3456

•Credit/ Debit

•Payphones

4. Applications of the smart card Applications

Page 31: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

30/83

4. Applications of the smart card Smart card in Retail E - Commerce

Page 32: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

31/83

•Emission Center

•Access rights

•Scrambling Keys

•Set up box

•Pay TV

•Pay TV

•Image Scrambling

4. Applications of the smart card Smart Cards in Pay TV

Page 33: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

32/83

•SMS Centre

•NetGate

•Internet

•Back

•Office

•Web

•server•Banking

•server

•GSM•OTAC

4. Applications of the smart cardSmart Card in Mobile PhonesBanking, Trading & Shopping

Page 34: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

33/83

•B: Global-Travel Agency

•E-Travel

•A: Joe Traveler

•CryptoFlex•CryptoFlex•A Public Key

•A Private Key

•Handshake

•Exchange Public Keys

•& Challenges

•B Private Key

•B Public Key

•B Public Key •A Public Key

•blablabla

•blablabla •B Challenge

4. Applications of the smart card Smart Cards in Network Security

Page 35: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

34/83•Page 34/43

•Social Security

•CNAM

The French Health Care System•Dr Smith • Mr. Martin

•Prescription

•Payment

•Professional •Mr. Martin

•1

•2

•3•4

•5

•6

4. Applications of the smart card Smart cards in Health

Page 36: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

35/83

?

Page 37: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

36/83

II. Smart Cards Attack – From ICTK

Attack to be consideredAttack

Category

Assurance gained by

Chip Evaluation Card Evaluation

1 Minimal Invasive or Non-Invasive Physical Attacks

Hardware

Evaluation

X

2 Physical Attacks to Retrieve Secret Data X

3 Overcoming Sensors, Switches and Filters X

4 Perturbation AttacksPerturbation

Analysis

X X

5 Retrieving keys with DFA X X

6 SPA/DPA – Non-invasive retrieving of secret dataSide-channel

Analysis

X X

7 EMA and Sound Attacks X X

8 Exploitation of Hardware Test Interfaces (JTAG) X

9 Attacks on RNG X

10 Software Attacks

Software Evaluation

X

11 Information gathering X

12 Editing Messages X

13 Direct protocol attacks X

14 Man-in-the-middle attacks X

15 Replay attacks X

16 Buffer overflow or stack overflow X

Page 38: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

37/83

Chip Fabrication

Page 39: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

38/83

Finished wafer

Page 40: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

39/83

Micro module etching

Page 41: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

40/83

Automatic etcher

Page 42: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

41/83

Result of etching process

Page 43: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

42/83

Silicon Inspection

Page 44: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

43/83

Reverse engineering

Page 45: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

44/83

Lay-out plots

Page 46: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

45/83

IR picture from back

Page 47: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

46/83

Metal mask ROM

Page 48: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

47/83

Ion implant ROM after staining

Page 49: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

48/83

Automated ROM scanning set-up

Page 50: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

49/83

Sub micron probe station

Page 51: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

50/83

Probing with eight needles

Page 52: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

51/83

Probing set-up

Page 53: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

52/83

Scanning Electron Microscope

Page 54: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

53/83

SEM: view mode

Page 55: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

54/83

SEM imaging

Page 56: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

55/83

Focused Ion Beam systems (FIB)

Page 57: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

56/83

FIB – milling mode

Page 58: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

57/83

Page 59: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

58/83

Page 60: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

59/83

Page 61: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

60/83

Page 62: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

61/83

Page 63: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

62/83

Page 64: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

63/83

Page 65: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

64/83

Page 66: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

65/83

Page 67: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

66/83

Page 68: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

67/83

Page 69: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

68/83

Page 70: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

69/83

Page 71: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

70/83

Page 72: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

71/83

Page 73: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

72/83

Page 74: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

73/83

Page 75: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

74/83

Page 76: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

75/83

Page 77: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

76/83

Page 78: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

77/83

Page 79: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

78/83

Page 80: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

79/83

Page 81: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

80/83

Page 82: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

81/83

Page 83: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

82/83

Page 84: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages

83/83