Verifying smart card applications An ASM approach

被引:0
|
作者
Haneberg, Dominik [1 ]
Grandy, Holger [1 ]
Reif, Wolfgang [1 ]
Schellhorn, Gerhard [1 ]
机构
[1] Univ Augsburg, Inst Informat, Lehrstuhl Softwaretech & Programmiersprachen, D-86135 Augsburg, Germany
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present PROSECCO1, a formal model for security protocols of smart card applications, based on Abstract State Machines (ASM) [BS03]JGur95], and a suitable method for verifying security properties of such protocols. The main part of this article describes the structure of the protocol ASM and all its relevant parts. Our modeling technique enables an attacker model exactly tailored to the application, instead of only an attacker similar to the Dolev-Yao model. We also introduce a proof technique for security properties of the protocols. Properties are proved in the KIV system using symbolic execution and invariants. Furthermore we describe a graphical notation based on UML diagrams that allows to specify the important parts of the application in a simple way. Our formal approach is exemplified with a small e-commerce application. We use an electronic wallet to demonstrate the ASM-based protocol model and we also show what the proof obligations of some of the security properties look like.
引用
收藏
页码:313 / 332
页数:20
相关论文
共 50 条
  • [1] Multiple applications with a single Smart Card
    Shaw, DT
    Maj, SP
    CERTIFICATION AND SECURITY IN E-SERVICES: FROM E-GOVERNMENT TO E-BUSINESS, 2003, 127 : 189 - 193
  • [2] Encryptive mechanism and applications of smart card
    Jisuanji Gongcheng, 3 (57-60):
  • [3] A Security Layer for Smart Card Applications Authentication
    Abd Elwahab, Amin
    Eldin, Ayman M. Bahaa
    Wahba, Ayman M.
    Sheirah, Mohamed A.
    2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES 2009), 2009, : 514 - 517
  • [4] SMART CARD APPLICATIONS IN SECURITY AND DATA PROTECTION
    GOUTAY, J
    LECTURE NOTES IN COMPUTER SCIENCE, 1985, 209 : 459 - 463
  • [5] Accountable ring signatures: A smart card approach
    Xu, SH
    Yung, MT
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS VI, 2004, 153 : 271 - 286
  • [6] Evaluating Countermeasures for Verifying the Integrity of Ethereum Smart Contract Applications
    Ji, Suhwan
    Kim, Dohyung
    Im, Hyeonseung
    IEEE ACCESS, 2021, 9 (09): : 90029 - 90042
  • [7] Developing smart card-based applications using Java']Java Card
    Vandewalle, JJ
    Vétillard, E
    SMART CARD RESEARCH AND APPLICATIONS, PROCEEDINGS, 2000, 1820 : 105 - 124
  • [8] Verifying Hypermedia Applications by Using an MDE Approach
    Picinin Junior, Delcino
    Koliver, Cristian
    Santos, Celso A. S.
    Farines, Jean-Marie
    SYSTEM ANALYSIS AND MODELING: MODELS AND REUSABILITY, 2014, 8769 : 174 - +
  • [9] TLS-Tandem: a smart card for WEB applications
    Urien, Pascal
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 3 - 4
  • [10] Enabling distributed corba access to smart card applications
    Chan, ATS
    Tse, F
    Cao, JN
    Leong, HV
    IEEE INTERNET COMPUTING, 2002, 6 (03) : 27 - 36