Formal proof of smart card applets correctness

被引:0
|
作者
Lanet, JL [1 ]
Requet, A [1 ]
机构
[1] Gemplus Res Grp, F-13881 Gemenos, France
关键词
!text type='Java']Java[!/text] byte code; security; optimisation; formal specification;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The new Gemplus smart card is based on the Java technology, embedding a virtual machine. The security policy uses mechanisms that are based on Java properties. This language provides segregation between applets. But due to the smart card constraints a byte code verifier can not be embedded. Moreover, in order to maximise the number of applets the byte code must be optimised. The security properties must be guaranteed despite of these optimisations. For this purpose, we propose an original manner to prove the equivalence between the interpreter of the JVM and our Java Card interpreter. It is based on the refinement and proof process of the B formal method.
引用
收藏
页码:85 / 97
页数:13
相关论文
共 50 条
  • [1] Developing a Trojan applets in a smart card
    Iguchi-Cartigny, Julien
    Lanet, Jean-Louis
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2010, 6 (04): : 343 - 351
  • [2] Checking secure interactions of smart card applets
    Bieber, P
    Cazin, J
    Girard, P
    Lanet, JL
    Wiels, V
    Zanon, G
    COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 1 - 16
  • [3] Formal Proof: Reconciling Correctness and Understanding
    Calude, Cristian S.
    Mueller, Christine
    INTELLIGENT COMPUTER MATHEMATICS, PROCEEDINGS, 2009, 5625 : 217 - 232
  • [4] Formal Correctness Proof for DPLL Procedure
    Maric, Filip
    Janicic, Predrag
    INFORMATICA, 2010, 21 (01) : 57 - 78
  • [5] A constructive approach to correctness, exemplified by a generator for certified Java']Java Card applets
    Coglio, Alessandro
    Green, Cordell
    VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS, 2008, 4171 : 57 - 63
  • [6] Compositional verification for secure loading of smart card applets
    Sprenger, C
    Gurov, D
    Huisman, M
    SECOND ACM AND IEEE INTERNATIONAL CONFERENCE ON FORMAL METHODS AND MODELS FOR CO-DESIGN, PROCEEDINGS, 2004, : 211 - 222
  • [7] Checking secure interactions of smart card applets: Extended version
    Bieber, P.
    Cazin, J.
    Girard, P.
    Lanet, J.-L.
    Wiels, V.
    Zanon, G.
    Journal of Computer Security, 2002, 10 (04) : 369 - 398
  • [8] FORMAL MODELS OF CALCULATIONS AND PROOF OF CORRECTNESS OF ALGORITHMS
    VOLNOV, IN
    VESTNIK LENINGRADSKOGO UNIVERSITETA SERIYA MATEMATIKA MEKHANIKA ASTRONOMIYA, 1988, (02): : 103 - 105
  • [9] A CORRECTNESS PROOF OF SORTING BY MEANS OF FORMAL PROCEDURES
    FOKKINGA, MM
    SCIENCE OF COMPUTER PROGRAMMING, 1987, 9 (03) : 263 - 269
  • [10] A Formal Correctness Proof for an EDF Scheduler Implementation
    Vanhems, Florian
    Rusu, Vlad
    Nowak, David
    Grimaud, Gilles
    2022 IEEE 28TH REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM (RTAS), 2022, : 281 - 292