2005
DOI: 10.1007/11526841_21
|View full text |Cite
|
Sign up to set email alerts
|

Formal Verification of Security Properties of Smart Card Embedded Source Code

Abstract: Abstract. This paper reports on a method to handle the verification of various security properties of imperative source code embedded on smart cards. The idea is to combine two program verification approaches: the functional verification at the source code level and the verification of high level properties on a formal model built from the program and its specification. The method presented uses the Caduceus tool, built on top of the Why tool. Caduceus enables the verification of an annotated C program and pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2006
2006
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…to take into account interruptions, specific modelisation choices or dedicated techniques are to be used (cf. [20]).…”
Section: B About (Mis)understandingsmentioning
confidence: 99%
See 1 more Smart Citation
“…to take into account interruptions, specific modelisation choices or dedicated techniques are to be used (cf. [20]).…”
Section: B About (Mis)understandingsmentioning
confidence: 99%
“…out ← accounts out := encode(Pwd(root)); IF Pwd(root) < guess THEN wait(10) ELSE wait (20); IF log ∈ Acc THEN out := fct(Acc) ELSE out := ∅…”
Section: About Elusive Propertiesmentioning
confidence: 99%
“…The bottom-up approach is used, for example, in [17] to generate Coq model of C code using tools like Caduceus and Why. The method presented in this paper can be seen as a mixed approach because the low-level model is designed by refining the higher-level models and by abstracting the C code to be certified.…”
Section: Related Workmentioning
confidence: 99%
“…As illustrated in Figure 1, this implies to formally model each function as a transition between global states of the card. In [1], [2], we presented a general method to build a formal transition system from a source code written in the C language. On one hand, the transition system is automatically extracted from a formal specification of the code.…”
Section: Anti-tearing Propertiesmentioning
confidence: 99%
“…We want to take advantage of the work done by a verification tool, like Caduceus, which needs to build a memory model to generate the verification conditions. More precisely, we propose a method (described in detail in [1], [2]) to build a transition system, formally linked to the source code and such that the memory states are computed by the Caduceus tool.…”
Section: Formal Transition System From C Source Codementioning
confidence: 99%