what is smart cards?...8 exploitation of hardware test interfaces (jtag) x 9 attacks on rng x 10...
TRANSCRIPT
![Page 2: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/2.jpg)
1/83
• Exploded view of a Smart Card
• Architecture of a Smart Card
• Memory Cards
• Microprocessor Cards
• Contactless Cards
1. What is a smart card?
![Page 3: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/3.jpg)
2/83
•Micro Module•8 or 6 Contacts
•Integrated Circuit
•Plastic Card
•Free Access Memory
•Protected Memory
•Microprocessor
•Contact Smart Card
•Contactless Smart Card
•ABS, PVC, Polycarbonate
•Hologram
•Brand Stamp
•Mag. Stripe
•Chip with ante
nna
Exploded view of a Smart Card1. What is a smart card?
![Page 4: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/4.jpg)
3/83
•C1 •C5
•C2 •C6
•C3 •C7
•C4 •C8
•C1: VCC(전압공급)
•C2: RST(리셋신호)
•C3: CLK(클럭신호)
•C4: Reserved
•C5: GND(접지)
•C6: Reserved
•C7: I/O(입출력)
•C8: Reserved•Module
•Chip
•Bonding Pads
•Address Data Bus
•I/O •CPU •NPU •RAM
•ROM•EEPROM
•Charge Pump
•Bonding Pads
•IC Chip
CARD BODY (Back)
•adhesive foil
•
•contact surface
•wire bond
•gluing surface
•Microprocessor (Chip)
•card body
•empty space
•epoxy
•Antenna Coil
Chip
Antenna
Module (Contacts)
CARD BODY (Front)
•Physical Architecture
Exploded view of a Smart Card1. What is a smart card?
![Page 5: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/5.jpg)
4/83
Contact Smart Card Standards1. What is a smart card?
• ISO 7816-1: Physical characteristics
• ISO 7816-2: Dimension & location of contacts
• ISO 7816-3: Electronic signal & transmission protocol
• ISO 7816-4: Interindustry commands
• ISO 7816-5: Resistration system for application in IC card
• ISO 7816-6: Interindustry data elements
• ISO 7816-7: Interindustry commands for Structured
Card Query Languge(SCQL)
• ISO 7816-8: Security architecture and related commands
![Page 6: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/6.jpg)
5/83
•ISO 7816 Standards
•The Very Big Bank
•1234 5678 9012 3456
•Rich Wealthy
•NET
•ISO 7816-1
•Dimensions and
•physical constraints•ISO 7816-2
•Electrical signals
•ISO 7816-3
•Communication
•protocole
•ISO 7816-4 ...
•Memory management and
•inter industry commands
Contact Smart Card Standards1. What is a smart card?
![Page 7: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/7.jpg)
6/83
• Free Access Memory card
•EEPROM :
•Application Data
•Wired Logic:
•Addressing
• a Memory Card can be compared to a Floppy disk...
Memory Card Architecture1. What is a smart card?
![Page 8: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/8.jpg)
7/83
•EPROM
•Security Info.
•Fuses
•Wired Logic :
•Addressing,
•Security
•EEPROM,
•Application Data
•EPROM :
•Security Info.•Wired Logic :
•Addressing,
•Security
•EEPROM :
•Abaccus counter
•Fuses
•EPROM
•Security Info.
•Fuses
•Wired Logic
•Addressing,
•Security
•EEPROM,
•Application Data
•Keys
• Protected Memory Card
Memory Card Architecture1. What is a smart card?
![Page 9: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/9.jpg)
8/83
•Clock •Reset
•Input /
Output
•CPU
•RAM :
•Scratch Pad
•ROM,
•Operating system•EEPROM,
•Application Memory
•EEPROM :
•Application Mem
ory
•ROM :
•Operating Syste
m
•a microprocessor card can be compared to a computer !!
1. What is a smart card? Microprocessor Card Architecture
![Page 10: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/10.jpg)
9/83
• CPU 6805/8051/H8/RISC
• 8 bits/16 bits/32 bits
• 3,57 / 5Mhz
• 5 / 3Volts
1. What is a smart card? Processing unit : CPU
![Page 11: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/11.jpg)
10/83
• RAM = Random Access Memory
• 128 up to 2 K bytes (Stack included)
• Scratch pad
• Checked and reseted after reset
1. What is a smart card? Volatile memory : RAM
![Page 12: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/12.jpg)
11/83
• ROM (Read Only Memory)
• EEPROM (Electrically Erasable and Programable Read Only Memory)
•ROM,
•Operating system•EEPROM,
•Application Memory
1. What is a smart card? Non Volatile memories
![Page 13: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/13.jpg)
12/83
• Operating System
– I/O protocol
– Chip handler
– External commands
– Memory management
– Authentication algorithms
• 6 up to 56k bytes
•ROM,
•Operating system•EEPROM,
•Application Memory
1. What is a smart card? ROM
![Page 14: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/14.jpg)
13/83
• Application memory
• Specific file architecture
• Data informations
• Softmask
• Data OS
• 1 up to 64 K bytes
1. What is a smart card? EEPROM
![Page 15: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/15.jpg)
14/83
• Light
• Temperature
• Passivation
• Clock
• Vcc
1. What is a smart card? Security componet
![Page 16: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/16.jpg)
15/83
•Plastic Card•Integrated Circuits
• o Power circuit
• o Analog I/O circuit
• o Data storage and processing
•Power transm
ission
•coil
•Data
•transmission
•coil or plates
•Smart Transportation Authority
•1234 5678 9012 3456
•City Dweller
•Smart Transportation Authority
•1234 5678 901
•City Dweller
1. What is a smart card? Contactless Cards
![Page 17: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/17.jpg)
16/83
•Smart card functions
•Mechanical strength•Data security
•Data storage •Data processing
2. How does a smart card work? Main Functions of a Smart Card
![Page 18: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/18.jpg)
17/83
• 1-Token card
– Read / write / erease data in memory
– Protect data (ex: serial number storage)
– Process certificates: Authentication,...
– Count units : Abaccos
• 2- Microprocessor cards
– Read / write / erease data
– Identify the card: component,...
– Manage Memory
– Manage Files (PC): multi-aplication cards,...
– Protect data (ex: secret key storage )
– Encrypt data( ex: financial transactions )
– Authenticate ( ex : card owner with PIN)
2. How does a smart card work? Functions of a Smart Card
![Page 19: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/19.jpg)
18/83
•READER CARD
•X select •Y s
ele
c
t
•Power, Clock
RAZ
•Messages
•Electronics
• +
•Connector
•I/O
lo
gic
2. How does a smart card work? Read and Write in a token Card
![Page 20: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/20.jpg)
19/83
• Plastic Cards
• Modules
• Embedding & Test
• Personalization
3. Manufacturing Process Manufacturing
![Page 21: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/21.jpg)
20/83
• ABS / ABS modified
• PVC
• Polycarbonate
• Hologram
• Brand Stamp
• Magnetic stripe
• Printing
3. Manufacturing Process Card Body
![Page 22: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/22.jpg)
21/83
• 8 or 6 contacts
– 1. Vcc
– 2. Reset
– 3. Clock
– 4. (Optional)
– 5. Ground
– 6. (optional)
– 7. Input/Output
– 8. (optional)
• Metal:Tungsten, Gold
3. Manufacturing Process Micro module
![Page 23: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/23.jpg)
22/83
•Sky High Transit
•Sky High Transit
•Sky High Transit
•Sky High Transit
•Punching
•Sky High Transit
•Sheet Printing
•Graphic data
•(Films, disk, syquest...)•Plastic sheet: PVC
3. Manufacturing Process Plastic Card Printing
![Page 24: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/24.jpg)
23/83
•Motorola, Atmel
•Texas Instruments
•SGS Thomson
•Siemens, Hitachi
•Probing
•Dicing
•Wafer
•Die
•Coating•Module
•Bonding
3. Manufacturing Process Module Assembly Process
![Page 25: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/25.jpg)
24/83
•1.Punch or mold
•Sky High Transit
•2. Mill
•3. Insert
•Sky High Transit•1234
•Super
•Glue
•Sky High Credit•1234
•1234 5678 9012 3456
•John Doe - Exp 13/999
•4. Test - Serialize
•5. Personalize
3. Manufacturing Process Embedding & Test
![Page 26: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/26.jpg)
25/83
•Customer ID file
•Microprocessor car
d encoding
•Final Inspec
tion and ship
ping
•Embossing
•Encoding
•Black box
•Personal ID mailing
•Mag tape
• Stripe Card
•Mag tape Sm
art Card
•Bank card (mP+magstripe) Personalization Process
3. Manufacturing Process Personalization Process
![Page 27: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/27.jpg)
26/83
•Chip manufacturer•Motorola, Siemens...
Main industrial actors in the smart card environment
•Printer •Embedder •Card supplier
•Card issuer:•Bank, Telecom,..
•Card Owner
•Service Provider
• , FDR
•Terminal manufacturer• , Verifone, L&G,...
•Processor
3. Manufacturing Process Industrial Actors
![Page 28: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/28.jpg)
27/83
• Benefits of the Smart Card
• Cards technology features
• Applications
• Exemple of Applications Architectures
4. Applications of the smart card Industrial Actors
![Page 29: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/29.jpg)
28/83
• Portable and mobile: identify the owner
• Convenient and flexible
• Protected and secure
• Good mechanical strength
• Proven technology with good reliability
• Can store and process data (personal, digital certificates,..)
• Cost effective
• Branded
• Innovative
•Why a smart card ?
4. Applications of the smart card
![Page 30: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/30.jpg)
29/83
•Access control
•network security
•Digital Cell. Phones
•Health Ca
re
•Mass Transit
•Ticketless Tr
aveling
•Electronic
•Commerce
•Electronic Purse•Loyalty
•Ultra Mall
•Rewards
•Pay TV•Access Control
•Parking
•The Very Big Bank
•Rich Wealthy
•NET
•1234 5678 9012 3456
•Credit/ Debit
•Payphones
4. Applications of the smart card Applications
![Page 31: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/31.jpg)
30/83
4. Applications of the smart card Smart card in Retail E - Commerce
![Page 32: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/32.jpg)
31/83
•Emission Center
•Access rights
•Scrambling Keys
•Set up box
•Pay TV
•Pay TV
•Image Scrambling
4. Applications of the smart card Smart Cards in Pay TV
![Page 33: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/33.jpg)
32/83
•SMS Centre
•NetGate
•Internet
•Back
•Office
•Web
•server•Banking
•server
•GSM•OTAC
4. Applications of the smart cardSmart Card in Mobile PhonesBanking, Trading & Shopping
![Page 34: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/34.jpg)
33/83
•B: Global-Travel Agency
•E-Travel
•A: Joe Traveler
•CryptoFlex•CryptoFlex•A Public Key
•A Private Key
•Handshake
•Exchange Public Keys
•& Challenges
•B Private Key
•B Public Key
•B Public Key •A Public Key
•blablabla
•blablabla •B Challenge
4. Applications of the smart card Smart Cards in Network Security
![Page 35: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/35.jpg)
34/83•Page 34/43
•Social Security
•CNAM
The French Health Care System•Dr Smith • Mr. Martin
•Prescription
•Payment
•Professional •Mr. Martin
•1
•2
•3•4
•5
•6
4. Applications of the smart card Smart cards in Health
![Page 36: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/36.jpg)
35/83
?
![Page 37: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/37.jpg)
36/83
II. Smart Cards Attack – From ICTK
Attack to be consideredAttack
Category
Assurance gained by
Chip Evaluation Card Evaluation
1 Minimal Invasive or Non-Invasive Physical Attacks
Hardware
Evaluation
X
2 Physical Attacks to Retrieve Secret Data X
3 Overcoming Sensors, Switches and Filters X
4 Perturbation AttacksPerturbation
Analysis
X X
5 Retrieving keys with DFA X X
6 SPA/DPA – Non-invasive retrieving of secret dataSide-channel
Analysis
X X
7 EMA and Sound Attacks X X
8 Exploitation of Hardware Test Interfaces (JTAG) X
9 Attacks on RNG X
10 Software Attacks
Software Evaluation
X
11 Information gathering X
12 Editing Messages X
13 Direct protocol attacks X
14 Man-in-the-middle attacks X
15 Replay attacks X
16 Buffer overflow or stack overflow X
![Page 38: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/38.jpg)
37/83
Chip Fabrication
![Page 39: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/39.jpg)
38/83
Finished wafer
![Page 40: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/40.jpg)
39/83
Micro module etching
![Page 41: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/41.jpg)
40/83
Automatic etcher
![Page 42: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/42.jpg)
41/83
Result of etching process
![Page 43: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/43.jpg)
42/83
Silicon Inspection
![Page 44: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/44.jpg)
43/83
Reverse engineering
![Page 45: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/45.jpg)
44/83
Lay-out plots
![Page 46: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/46.jpg)
45/83
IR picture from back
![Page 47: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/47.jpg)
46/83
Metal mask ROM
![Page 48: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/48.jpg)
47/83
Ion implant ROM after staining
![Page 49: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/49.jpg)
48/83
Automated ROM scanning set-up
![Page 50: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/50.jpg)
49/83
Sub micron probe station
![Page 51: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/51.jpg)
50/83
Probing with eight needles
![Page 52: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/52.jpg)
51/83
Probing set-up
![Page 53: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/53.jpg)
52/83
Scanning Electron Microscope
![Page 54: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/54.jpg)
53/83
SEM: view mode
![Page 55: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/55.jpg)
54/83
SEM imaging
![Page 56: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/56.jpg)
55/83
Focused Ion Beam systems (FIB)
![Page 57: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/57.jpg)
56/83
FIB – milling mode
![Page 58: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/58.jpg)
57/83
![Page 59: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/59.jpg)
58/83
![Page 60: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/60.jpg)
59/83
![Page 61: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/61.jpg)
60/83
![Page 62: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/62.jpg)
61/83
![Page 63: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/63.jpg)
62/83
![Page 64: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/64.jpg)
63/83
![Page 65: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/65.jpg)
64/83
![Page 66: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/66.jpg)
65/83
![Page 67: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/67.jpg)
66/83
![Page 68: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/68.jpg)
67/83
![Page 69: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/69.jpg)
68/83
![Page 70: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/70.jpg)
69/83
![Page 71: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/71.jpg)
70/83
![Page 72: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/72.jpg)
71/83
![Page 73: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/73.jpg)
72/83
![Page 74: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/74.jpg)
73/83
![Page 75: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/75.jpg)
74/83
![Page 76: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/76.jpg)
75/83
![Page 77: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/77.jpg)
76/83
![Page 78: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/78.jpg)
77/83
![Page 79: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/79.jpg)
78/83
![Page 80: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/80.jpg)
79/83
![Page 81: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/81.jpg)
80/83
![Page 82: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/82.jpg)
81/83
![Page 83: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/83.jpg)
82/83
![Page 84: What is Smart Cards?...8 Exploitation of Hardware Test Interfaces (JTAG) X 9 Attacks on RNG X 10 Software Attacks Software Evaluation X 11 Information gathering X 12 Editing Messages](https://reader030.vdocument.in/reader030/viewer/2022040320/5e4d9e43ad38421e9c3f1206/html5/thumbnails/84.jpg)
83/83