Mobile Threat Catalogue

Smartcard Crypto Protocol, Design, and Implementation


Threat Category: USIM / SIM / UICC security

ID: STA-31

Threat Description: Cryptographic protocols handle consecutive cryptographic operations to perform transactions. Cryptographic protocols must be carefully designed to avoid fallbacks with transactions.

Threat Origin

A Review of Smartcard Security Issues 1

Exploit Examples

Not Applicable

CVE Examples

Not Applicable

Possible Countermeasures


  1. H. Ko and R. Caytiles, “A Review of Smartcard Security Issues,” Journal of Security Engineering, 8, no. 3 (2011): 6. [accessed 10/11/21]