This page presents details of security vulnerabilities and attack techniques discovered as a result of our Java Card security research project. These details are provided in a form of original vulnerability reports and accompanying Proof of Concept Codes.
Please note, that there are more unpublished security issues affecting Gemalto UICC (SIM / USIM) cards making it possible to get unauthorised access to the card, break card's security and get access to STK keys used for remote management (SIM / USIM applications and file system). Corresponding security and vulnerability intelligence is available through a new company (Adam Gowdiak Security Research).
Proof of Concept Codes below are provided purely for educational purposes only. It is expressly forbidden to use them for any purposes that would violate any domestic or international laws. If you do not agree with this policy, please leave this page.