Using formal methods to cultivate trust in Smart Card Operating Systems

نویسندگان

  • Marjan I. Alberda
  • Pieter H. Hartel
  • Eduard K. de Jong Frz
چکیده

To be widely accepted, smart cards must contain completely trustworthy software. Because smart cards contain relatively simple computers, and are used only for a speciic class of applications, it is feasible to make the language used to program the software components focused and tiny. Formal methods can be used to precisely specify this language and to reason about properties of the language, which results in more trustworthy software. We explore this process by specifying the core of a proprietary systems programming language for smart card operating systems. We show how the speciication obtained is used in proofs, and in the development of tool support.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GemClassifier, a formally developed smart card

In a previous paper [Lan-00] we explained that smart cards could be the ideal domain for applying formal methods. We said that the need of formal methods has three origins: mastering the complexity of the new operating systems, certifying at a high level a part of the smart card and reducing the cost of the test. We believed that these reasons were enough to introduce formal methods in the soft...

متن کامل

The use of B for Smart Card

In a previous paper [Lan-00] we stated that smart cards could be the ideal domain for applying formal methods. We said that the need of formal methods has three origins: mastering the complexity of the new operating systems, certifying at a high level a part of the smart card and reducing the cost of the validation. We believed that these reasons were enough to introduce formal methods in the s...

متن کامل

Specification and verification of security policies for smart cards

Security systems that use smart cards are nowadays an important part of our daily life, which becomes increasingly dependent on the reliability of such systems, for example cash cards, electronic health cards or identification documents. Since a security policy states both the main security objectives and the security functions of a certain security system, it is the basis for the reliable syst...

متن کامل

Smart Cards and Card Operating Systems Smart Cards and Card Operating Systems

The operating system of an IC card should provide an appropriate interface to applications using IC cards. An incorrect choice of operations and data renders the card inefcient and cumbersome. The design principles of the UNIX operating system are most appropriate for IC card operating system design. The actual design that we recognise as UNIX (or any other current operating system for that mat...

متن کامل

Formal Verification of Security Properties of Smart Card Embedded Source Code

This paper reports on a method to handle the verification of various security properties of imperative source code embedded on smart cards. The idea is to combine two program verification approaches: the functional verification at the source code level and the verification of high level properties on a formal model built from the program and its specification. The method presented uses the Cadu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Future Generation Comp. Syst.

دوره 13  شماره 

صفحات  -

تاریخ انتشار 1996