Verifying smart card applications An ASM approach

被引:0
|
作者
Haneberg, Dominik [1 ]
Grandy, Holger [1 ]
Reif, Wolfgang [1 ]
Schellhorn, Gerhard [1 ]
机构
[1] Univ Augsburg, Inst Informat, Lehrstuhl Softwaretech & Programmiersprachen, D-86135 Augsburg, Germany
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present PROSECCO1, a formal model for security protocols of smart card applications, based on Abstract State Machines (ASM) [BS03]JGur95], and a suitable method for verifying security properties of such protocols. The main part of this article describes the structure of the protocol ASM and all its relevant parts. Our modeling technique enables an attacker model exactly tailored to the application, instead of only an attacker similar to the Dolev-Yao model. We also introduce a proof technique for security properties of the protocols. Properties are proved in the KIV system using symbolic execution and invariants. Furthermore we describe a graphical notation based on UML diagrams that allows to specify the important parts of the application in a simple way. Our formal approach is exemplified with a small e-commerce application. We use an electronic wallet to demonstrate the ASM-based protocol model and we also show what the proof obligations of some of the security properties look like.
引用
收藏
页码:313 / 332
页数:20
相关论文
共 50 条
  • [22] Smart card
    2000, Cahners Bus Inf, Highlands Ranch, CO, USA (55):
  • [23] Smart Card
    Linton, Otha
    ACADEMIC RADIOLOGY, 2010, 17 (11) : 1455 - 1455
  • [24] How Smart Is a Smart Card?
    Naone, Erica
    TECHNOLOGY REVIEW, 2008, 111 (06) : 90 - 91
  • [25] The Open Card Framework for the Smart Card
    Xu, JW
    Liang, JL
    ISTM/2005: 6th International Symposium on Test and Measurement, Vols 1-9, Conference Proceedings, 2005, : 5960 - 5961
  • [26] A B formal framework for security developments in the domain of smart card applications
    Dadeau, Frederic
    Potet, Marie-Laure
    Tissot, Regis
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 141 - +
  • [27] A Generic Proxy for Secure Smart Card-Enabled Web Applications
    Starnberger, Guenther
    Froihofer, Lorenz
    Goeschka, Karl M.
    WEB ENGINEERING, 2010, 6189 : 370 - 384
  • [28] A taxonomy of various attacks on smart card-based applications and countermeasures
    Gupta, B. B.
    Quamara, Megha
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (07):
  • [29] The design, simulation and synthesis of simplex IC microchips for smart card applications
    Harun, MHH
    Othman, M
    2002 IEEE INTERNATIONAL CONFERENCE ON SEMICONDUCTOR ELECTRONICS, PROCEEDINGS, 2002, : 424 - 427
  • [30] Creating Added Value for Smart Card Applications: The University as a Case Study
    Wu, Hsiao-Chi
    Chen, Jen Wel
    Hsieh, Ching-Cha
    PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER-HUMAN INTERACTIONS (ACHI 2011), 2011, : 176 - 181