We can easily recognize that FHC fully contrasts SSA-attacks (those based on the signature software compromission) under both the general and ad-hoc modality, exploiting the trusted extra communication channel between the user and the Java card
. Now let consider JWA-attacks (tampering the Java Virtual Machine in such a way it returns a maliciously-selected digest).
work through what are called "applets," tiny programs that carry out individual applications, Pattinson says.
The MIPS32 4KSc smart card core accelerates the interpretation of Java Card
byte codes and similar interpretive languages by the addition of a scaled, indexed 32-bit load instruction that is also part of the SmartMIPS architecture.
Bull Smart Cards and Terminals, in collaboration with STMicroelectronics and Sun Microsystems, hopes to gain between 30 and 40 Java applications from the "Simagine 2000 - Worldwide GSM Java Card
developer contest" which will run until February 2 2000.
It has a smart card reader and a Java card
with logon on and access privileges.
The infrastructure will be supported by Sun's Java Enterprise System (JES), capable of supporting any application or operating environment, and the network will be accessed via Sun Java Card
's which will provide individual and secure environments for all pupils and teaching staff, the company claims.Used in conjunction with Sun Ray Ultra Thin Clients, the schools will be able to run an ICT service that enables quick access through virtual desktops.
But Micro Edition took the concept of the split VM from the existing Java Card
implementation for smart cards.