This work presents a process of deploying applications securely to fielded devices with smart cards whilst taking into consideration the possibility that the client device could be malicious. Advantages of the proposed process include; caching functionality upon the device, optimal use of resources, employment of nested security contexts whilst addressing fielded infrastructures and a homogeneous solution. This work outlines a targeted scenario, details existing malicious device activity and defines an attacker profile. Assumptions and requirements are drawn and analysis of the proposal and attack scenarios is conducted. Advantages and deployment scenarios are presented with an implementation the process using Java and specific standards.