Checking Secure Interactions of Smart Card
نویسندگان
چکیده
This paper presents an approach enabling a smart card is suer to verify that a new applet securely interacts with already down loaded applets A security policy has been de ned that associates levels to applet attributes and methods and de nes authorized ows between levels We propose a technique based on model checking to verify that actual information ows between applets are authorized We illustrate our approach on applets involved in an electronic purse running on Java enabled smart cards
منابع مشابه
Checking Secure Interactions of Smart Card Applets
This paper presents an approach enabling a smart card issuer to verify that a new applet securely interacts with already downloaded applets. A security policy has been de ned that associates levels to applet attributes and methods and de nes authorized ows between levels. We propose a technique based on model checking to verify that actual information ows between applets are authorized. We illu...
متن کاملChecking Secure Interactions of Smart Card Applets: Extended Version
This paper presents an approach enabling a smart card is-suer to verify that a new applet securely interacts with already down-loaded applets. A security policy has been deened that associates levels to applet attributes and methods and deenes authorized ows between levels. We propose a technique based on model checking to verify that actual information ows between applets are authorized. We il...
متن کاملChecking Absence of Illicit Applet Interactions: A Case Study
This paper presents the use of a method – and its corresponding tool set – for compositional verification of applet interactions on a realistic industrial smart card case study. The case study, an electronic purse, is provided by smart card producer Gemplus as a test case for formal methods for smart cards. The verification method focuses on the possible interactions between different applets, ...
متن کاملLightweight and provably secure user authentication with anonymity for the global mobility network
Seamless roaming in the global mobility network (GLOMONET) is highly desirable for mobile users, although their proper authentication is challenging. This is because not only are wireless networks susceptible to attacks, but also mobile terminals have limited computational power. Recently, some authentication schemes with anonymity for the GLOMONET have been proposed. This paper shows some secu...
متن کاملMasking the Energy Behavior of Encryption Algorithms
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has drawn a lot of negative publicity for smart card usage. The power measurement techniques rely on the data-dependent energy behavior of the underlying system. Further, power analysis can be used to identify the specific ...
متن کامل