2004
DOI: 10.1007/978-3-540-24721-0_6
|View full text |Cite
|
Sign up to set email alerts
|

Checking Absence of Illicit Applet Interactions: A Case Study

Abstract: Abstract. This paper presents the use of a method -and its corresponding tool set -for compositional verification of applet interactions on a realistic industrial smart card case study. The case study, an electronic purse, is provided by smart card producer Gemplus as a test case for formal methods for smart cards. The verification method focuses on the possible interactions between different applets, co-existing on the same card, and provides a technique to specify and detect illicit interactions between thes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2005
2005
2014
2014

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(16 citation statements)
references
References 9 publications
0
16
0
Order By: Relevance
“…Therefore, the ClaimChecker during validation of A parses all interfaces declared in the CAP file of A (lines 5-6) and checks with the Export component if the interface is exported. Thus the ClaimChecker successfully identifies all shareable interfaces (lines 9-12), and for each of these interfaces it goes through the declared method tokens matching them with the Provides A set (lines [8][9][10][11][12][13][14][15][16][17][18][19][20][21][22]. By definition of the shareable A and by construction of the ClaimChecker (in compliance with the JCRE specifications), shareable A ⊆ Provides A .…”
Section: VImentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, the ClaimChecker during validation of A parses all interfaces declared in the CAP file of A (lines 5-6) and checks with the Export component if the interface is exported. Thus the ClaimChecker successfully identifies all shareable interfaces (lines 9-12), and for each of these interfaces it goes through the declared method tokens matching them with the Provides A set (lines [8][9][10][11][12][13][14][15][16][17][18][19][20][21][22]. By definition of the shareable A and by construction of the ClaimChecker (in compliance with the JCRE specifications), shareable A ⊆ Provides A .…”
Section: VImentioning
confidence: 99%
“…There were investigations [12,21,22,23] of static scenarios, when all applets are known and the composition is analyzed off-device. For example, Avvenuti et al [24] have developed the JBIFV tool which verifies whether a JC applet respects pre-defined information flow policies.…”
Section: Related Workmentioning
confidence: 99%
“…The reason for choosing Java Card and Multos is twofold: a) they represent two contrasting architectures to implement the rewall mechanism, and b) they are the two most deployed smart card platforms. Furthermore, the rewall mechanisms deployed in the ICOM are mature [28,29,185,187,188] and have been extensively studied [189] [192], which cannot be claimed for the UCOM.…”
Section: Application Sharing Mechanismmentioning
confidence: 99%
“…These formalizations have been used to formally verify applet isolation and confidentiality properties [3,4,15]. With our type system, applet isolation can be mostly checked syntactically.…”
Section: Related Workmentioning
confidence: 99%