Smart card designers need security tools
As new consumer appliances designed to access content or services emerge, and with them demand to incorporate more security functions, it's becoming crucial for chip designers to provide simulation tools to evaluate chips at the design level for possible leakage of confidential information, experts here said.
Panelists at the DATE 2004 conference here also warned that attackers use a variety of technologies to compromise the security of smart cards. They range from invasive and non-invasive attacks in hardware to software attacks such as buffer overflow and Trojan Horses that deliberately inject codes that can be hidden in a harmless and attractive program such as a game.
In implementing high-security smart cards, each link of the security chain needs to be carefully considered from hardware up to system architecture, the panel said.
By Junko Yoshida at EE Times.
[ Read more ]
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.