Smart card designers need security tools

Wednesday, 18 February 2004, 5:17 PM EST

As new consumer appliances designed to access content or services emerge, and with them demand to incorporate more security functions, it's becoming crucial for chip designers to provide simulation tools to evaluate chips at the design level for possible leakage of confidential information, experts here said.

Panelists at the DATE 2004 conference here also warned that attackers use a variety of technologies to compromise the security of smart cards. They range from invasive and non-invasive attacks in hardware to software attacks such as buffer overflow and Trojan Horses that deliberately inject codes that can be hidden in a harmless and attractive program such as a game.

In implementing high-security smart cards, each link of the security chain needs to be carefully considered from hardware up to system architecture, the panel said.

By Junko Yoshida at EE Times.

[ Read more ]




Spotlight

Hackers indicted for stealing Apache helicopter training software

Posted on 1 October 2014.  |  Members of a computer hacking ring have been charged with breaking into computer networks of prominent technology companies and the US Army and stealing more than $100 million in intellectual property and other proprietary data.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Oct 1st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //