2002
DOI: 10.1002/spe.438
|View full text |Cite
|
Sign up to set email alerts
|

Bytecode verification on Java smart cards

Abstract: This article presents a novel approach to the problem of bytecode verification for Java Card applets. By relying on prior off-card bytecode transformations, we simplify the bytecode verifier and reduce its memory requirements to the point where it can be embedded on a smart card, thus increasing significantly the security of post-issuance downloading of applets on Java Cards. This article describes the on-card verification algorithm and the off-card code transformations, and evaluates experimentally their impa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0
1

Year Published

2004
2004
2011
2011

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 70 publications
(28 citation statements)
references
References 19 publications
0
27
0
1
Order By: Relevance
“…However, in the UCOM environment, applications are not required to be evaluated by third parties, and so evaluations can be costly, and may discourage small and medium-scale organisations from opting for the UCTD-based architecture. To verify the security and reliability of an application, a smart card can employ on-card veri cation mechanisms like bytecode veri cation [128].…”
Section: Security Assurance and Validation Mechanismmentioning
confidence: 99%
See 3 more Smart Citations
“…However, in the UCOM environment, applications are not required to be evaluated by third parties, and so evaluations can be costly, and may discourage small and medium-scale organisations from opting for the UCTD-based architecture. To verify the security and reliability of an application, a smart card can employ on-card veri cation mechanisms like bytecode veri cation [128].…”
Section: Security Assurance and Validation Mechanismmentioning
confidence: 99%
“…For this purpose an on-card byte code veri cation is performed [161], which is already mandated by the Java Card 3 [16]; this can be based on the well-de ned on-card byte code veri cation proposals [128,161] [163].…”
Section: Proposed Smart Card Management Frameworkmentioning
confidence: 99%
See 2 more Smart Citations
“…In a recent paper [18], Leroy discusses the cost of traditional bytecode verification on Java cards, and also discusses alternatives. Leroy writes:…”
Section: Typecheckingmentioning
confidence: 99%