Search /
Advanced search  |  Help  |  Site map
Click for Layer 8! No, really, click NOW!
Networking for Small Business
Where's my gigabit Internet, anyway?
Americans cool with lab-grown organs, but not designer babies
IE6: Retired but not dead yet
Enterprise who? Google says little about Apps, business cloud services in Q1 report
DDoS Attackers Change Techniques To Wallop Sites
Can we talk? Internet of Things vendors face a communications 'mess'
AMD's profitability streak ends at two quarters
Michaels says breach at its stores affected nearly 3M payment cards
Exclusive: Google's Project Loon tests move to LTE band in Nevada
H-1B loophole may help California utility offshore IT jobs
How a cyber cop patrols the underworld of e-commerce
For Red Hat, it's RHEL and then…?
Will the Internet of Things Become the Internet of Broken Things?
Kill switches coming to iPhone, Android, Windows devices in 2015
Israeli start-up, working with GE, out to detect Stuxnet-like attacks
Galaxy S5 deep-dive review: Long on hype, short on delivery
Google revenue jumps 19 percent but still disappoints
Windows XP's retirement turns into major security project for Chinese firm
Teen arrested in Heartbleed attack against Canadian tax site
Still deploying 11n Wi-Fi?  You might want to think again
Collaboration 2.0: Old meets new
9 Things You Need to Know Before You Store Data in the Cloud
Can Heartbleed be used in DDoS attacks?
Secure browsers offer alternatives to Chrome, IE and Firefox
Linksys WRT1900AC Wi-Fi router: Faster than anything we've tested

Upgrade to smart card security needed

Today's breaking news
Send to a friendFeedback

Researchers at the University of Cambridge in England have invalidated the security systems in many smart card systems by developing a way of attacking and causing faults in cards using common tools such as a photographer's flash gun and a microscope.

Ross Anderson of Cambridge University's Computer Laboratory Monday described the discovery, by doctoral candidate Sergei Skorobogatov, at the IEEE Symposium on Security and Privacy in Oakland, Calif.

This method is much simpler and more effective than the techniques used in the past, the researchers said in a statement. While many security processors can stop the more basic attacks, they will now have to be upgraded, it said.

Simply shielding the processor by adding, for example, a top metal layer to the chip is no longer enough, because silicon becomes transparent to the light in an infrared flash and the chip can therefore be attacked from the rear. Electromagnetic pulses and X-rays could also be used, the researchers said in their statement.

The attack technique was kept under wraps for a year until defensive technologies could be developed. A new silicon technology has now been discovered that can block this and many of the previously known attacks, they said.

Cambridge Laboratory's team has to look at both sides of the smart card security battle, said Simon Moore, another of the team's researchers, on Tuesday. "(We try) to design better smart cards using better techniques and circuit designs, but we also look at how to break them. It's like being a good locksmith - you have to know how to pick locks," he said.

Cambridge Laboratory has been working with the European smart card industry to improve security, Moore said.

The idea for the new attacks came from reading reports about work on older chips and wondering how sensitive the new opaque plastic packaging used on most current smart cards would be, he said.

"We want the public to be wary of these technologies because while they have appropriate uses, such as for [Subscriber Identity Module] cards, (there is talk of using them) as national identity cards. That's of great concern because there is then the potential to clone these cards and create fake ones. A fake SIM card may not cause a great personal cost to the person who loses it, but a fake passport could almost ruin their life."

The IDG News Service is a Network World affiliate.


Error 404--Not Found

Error 404--Not Found

From RFC 2068 Hypertext Transfer Protocol -- HTTP/1.1:

10.4.5 404 Not Found

The server has not found anything matching the Request-URI. No indication is given of whether the condition is temporary or permanent.

If the server does not wish to make this information available to the client, the status code 403 (Forbidden) can be used instead. The 410 (Gone) status code SHOULD be used if the server knows, through some internally configurable mechanism, that an old resource is permanently unavailable and has no forwarding address.

NWFusion offers more than 40 FREE technology-specific email newsletters in key network technology areas such as NSM, VPNs, Convergence, Security and more.
Click here to sign up!
New Event - WANs: Optimizing Your Network Now.
Hear from the experts about the innovations that are already starting to shake up the WAN world. Free Network World Technology Tour and Expo in Dallas, San Francisco, Washington DC, and New York.
Attend FREE
Your FREE Network World subscription will also include breaking news and information on wireless, storage, infrastructure, carriers and SPs, enterprise applications, videoconferencing, plus product reviews, technology insiders, management surveys and technology updates - GET IT NOW.