[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2659651.2659714acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Instrumental System for Analysis of Information Systems Using Smart Cards Protection

Published: 09 September 2014 Publication History

Abstract

Modern smart card is a multi-purpose tool that is used in many areas of science and technology [5]. Microprocessor cards are used for access control, e-commerce, identification and authentication, used as personal data protected storages, as the core of e-passports and documents. In circulation there are tens of millions of devices simultaneously, and it is all the more credible by both the producers and by users [7]. All this leads to increase of attention from both developers (to protect information) and intruders.
In this context, the problem of the development of new software and hardware solutions for smart cards and security analysis using their information systems (IS), including research methods, modeling, statistical estimation, as well as specialized software tools is important.

References

[1]
Babenko, L.K.; Bespalov, D.A.; Makarevich, O.B.; Solovyov, S.V. 2010. Development of the modeling operating system for simulation the behavior of intelligent microprocessor cards. Materials XI International Scientific-Practical Conference "Information Security". Part 2. - Taganrog Univ Tsure. 247--249.
[2]
Bespalov, D.A.; Lexin, D.M.; Linnikov, V.I.; Soloviev, S.V. 2010. Solving problems identifying the type of intelligent cards. Materials XI International Scientific-Practical Conference "Information Security". Part 2. - Taganrog Univ Tsure. - 249--252.
[3]
Babenko, L.K.; Bespalov, D.A.; Chesnokov, R.D. 2012. Hardware module registration protocols contactless cards. Proceedings XII International scientific and practical conference "IS -2012". Proceedings of the II All-Russian Youth Conference " Perspektiva 2012" - Taganrog: Tsure. 139--143.
[4]
Bespalov, D.A.; Makarevich, O.B.; Chesnokov, R.D. 2012. Software package for analysis of communication protocols in contactless identification systems. Proceedings XII International scientific and practical conference "IS -2012". Proceedings of the II All-Russian Youth Conference "Perspektiva 2012" - Taganrog: Tsure. 143--147.
[5]
Babenko, L.K.; Ischukov, S.S.; Makarevich, O.B. 2003. Data protection using smart cards and electronic transmitters. Helios ARV. 352.
[6]
Avdoshyn, S.M.; Saveliev, A.A. 2009. A new approach to the problem of analyzing the effectiveness of cryptosystems / / Information Technology. - No 8. 2--9.
[7]
Syed, A.; Mohammad, I. 2008. RFID handbook. Applications, Technology, Security, and Privacy. CRC Press. 714.
[8]
Hollestelle, G.; Burgers, W.; Hartog, J. 2004. Power analysis on smartcard algorithms using simulation. Eindhoven, University of Technology. 40

Cited By

View all
  • (2020)Using the isolation forest algorithm to solve the problem of detecting anomalies in the operation of microprocessor plastic cardsInformatization and communication10.34219/2078-8320-2020-11-3-26-30(26-30)Online publication date: 5-May-2020

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
SIN '14: Proceedings of the 7th International Conference on Security of Information and Networks
September 2014
518 pages
ISBN:9781450330336
DOI:10.1145/2659651
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 September 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Smart card
  2. attack
  3. breaker
  4. extension board
  5. hardware
  6. information system
  7. instrumental complex
  8. microprocessor
  9. model
  10. software
  11. vulnerability

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

SIN '14

Acceptance Rates

SIN '14 Paper Acceptance Rate 32 of 109 submissions, 29%;
Overall Acceptance Rate 102 of 289 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2020)Using the isolation forest algorithm to solve the problem of detecting anomalies in the operation of microprocessor plastic cardsInformatization and communication10.34219/2078-8320-2020-11-3-26-30(26-30)Online publication date: 5-May-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media