

The potential for code read-out affects most modern smart cards. This talk describes a method for extracting smart card software for analysis through semi-automated reverse-engineering of circuits and optical memory read-out 4. Vulnerability analysis by manufacturers and contracted labs has overlooked bugs numerous times, so independent analysis is needed for software protected by smart cards 3. The secured chips not only protect secret keys but also shield software and protocols from independent analysis.

Smart card chips provide the trust base for various applications from banking to ID cards to hardware encryption 2.


1 Reviving smart card analysis Christopher Tarnovsky Karsten NohlĢ Executive summary Modern smart cards should be analyzed 1.
