Breaking Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit
- đ¤ Speaker: Andriana E. Gkaniatsou, Edinburgh University đ Website
- đ Date & Time: Friday 13 November 2015, 16:00 - 16:45
- đ Venue: Computer Laboratory, William Gates Building, Room FW11
Abstract
Smart-Cards are considered as one of the most secure, trusted and tamper-resistant devices for performing cryptographic operations. The commonly used RSA PKCS #11 standard defines the API for cryptographic hardware such as smart-cards. Though there has been work on formally verifying the correctness of the implementation of PKCS #11 in the API level, little or none attention has been paid on the low-level protocols that are closely connected to it. We will present REPROVE an automated tool that reverse-engineers the low-level communication between a smart-card and a reader, deduces the card’s functionalities and maps that communication to PKCS #11 functions. REPROVE is implementation practice independent and does not require access to the card nor to its API .
Series This talk is part of the Computer Laboratory Security Group meeting presentations series.
Included in Lists
This talk is not included in any other list.
Note: Ex-directory lists are not shown.
![[Talks.cam]](/static/images/talkslogosmall.gif)



Friday 13 November 2015, 16:00-16:45