Compositional verification for secure loading of smart card applets

被引:3
|
作者
Sprenger, C [1 ]
Gurov, D [1 ]
Huisman, M [1 ]
机构
[1] Swiss Fed Inst Technol, Zurich, Switzerland
关键词
D O I
10.1109/MEMCOD.2004.1459857
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present an algorithmic compositional verification method for smart card applets and control flow based safety properties expressed in a modal logic with simultaneous greatest fixed points. Our method builds on a technique proposed by Grumberg and Long who use maximal models to reduce compositional verification of finite-state parallel processes to standard model checking. We adapt this technique to applets, a class of infinite-state sequential processes. This requires a refinement of the method, since for a given applet interface and behavioural formula a maximal applet does not always exist. We therefore propose a two-level approach, where local assumptions restrict the control flow structure of applets, while the global guarantee restricts the control flow behaviour of the system. We present a novel maximal model construction for our logic and then adapt it to applets. By separating the tasks of verifying global and local properties our method supports secure post-issuance loading of applets onto a smart card.
引用
收藏
页码:211 / 222
页数:12
相关论文
共 50 条
  • [11] Towards a secure and practical multifunctional smart card
    Bakdi, I
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2006, 3928 : 16 - 31
  • [12] A Comprehensively Secure Smart card access controls
    Alazmi, Sulaiman
    Khan, Ahmad Raza
    Yu, Qian
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [13] Secure network card - Implementation of a standard network stack in a smart card
    Montgomery, M
    Ali, A
    Lu, K
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS VI, 2004, 153 : 193 - 208
  • [14] Fingerprint verification system involving smart card
    Gil, Y
    Moon, D
    Pan, S
    Chung, Y
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2002, 2002, 2587 : 510 - 524
  • [15] Secure Internet access and the role of Network Smart Card
    Ali, AM
    Montgomery, MA
    Proceedings of the Fourth IASTED International Conference on Communications, Internet, and Information Technology, 2005, : 259 - 265
  • [16] A Secure Fingerprint Template Generation Algorithm for Smart Card
    Moon, Daesung
    Chae, Seung-Hoon
    Kim, Jeong-Nyeo
    IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE 2011), 2011, : 719 - +
  • [17] Smart card based secure password authentication scheme
    Wang, SJ
    Chang, JF
    COMPUTERS & SECURITY, 1996, 15 (03) : 231 - 237
  • [18] Research on secure scheme of smart card application system
    Liu, MS
    Zhong, Q
    Ma, YH
    Wang, SH
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 2301 - 2304
  • [19] An Efficient and Secure Smart Card Based Authentication Scheme
    Chen, Chien-Ming
    Xiang, Bin
    Wang, King-Hang
    Zhang, Yong
    Wu, Tsu-Yang
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (04): : 1113 - 1123
  • [20] Advanced verification system using a smart card for smart city users
    Limbasiya, Trupil
    Garg, Mihir
    Shandil, Shivam
    PHYSICAL COMMUNICATION, 2018, 29 : 319 - 328