Mobile Threat Catalogue

Smartcard Crypto Protocol, Design, and Implementation

Contribute

Threat Category: USIM / SIM / UICC security

ID: STA-31

Threat Description: Cryptographic protocols handle consecutive cryptographic operations to perform transactions. Cryptographic protocols must be carefully designed to avoid fallbacks with transactions.

Threat Origin

A Review of Smartcard Security Issues 1

Exploit Examples

Not Applicable

CVE Examples

Not Applicable

Possible Countermeasures

References

  1. H. Ko and R. Caytiles, “A Review of Smartcard Security Issues,” Journal of Security Engineering, 8, no. 3 (2011): 6. https://docplayer.net/23347975-A-review-of-smartcard-security-issues.html [accessed 10/11/21]