Verifying smart card applications An ASM approach

被引:0
|
作者
Haneberg, Dominik [1 ]
Grandy, Holger [1 ]
Reif, Wolfgang [1 ]
Schellhorn, Gerhard [1 ]
机构
[1] Univ Augsburg, Inst Informat, Lehrstuhl Softwaretech & Programmiersprachen, D-86135 Augsburg, Germany
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present PROSECCO1, a formal model for security protocols of smart card applications, based on Abstract State Machines (ASM) [BS03]JGur95], and a suitable method for verifying security properties of such protocols. The main part of this article describes the structure of the protocol ASM and all its relevant parts. Our modeling technique enables an attacker model exactly tailored to the application, instead of only an attacker similar to the Dolev-Yao model. We also introduce a proof technique for security properties of the protocols. Properties are proved in the KIV system using symbolic execution and invariants. Furthermore we describe a graphical notation based on UML diagrams that allows to specify the important parts of the application in a simple way. Our formal approach is exemplified with a small e-commerce application. We use an electronic wallet to demonstrate the ASM-based protocol model and we also show what the proof obligations of some of the security properties look like.
引用
收藏
页码:313 / 332
页数:20
相关论文
共 50 条
  • [31] Balanced self-checking asynchronous logic for smart card applications
    Moore, S
    Anderson, R
    Mullins, R
    Taylor, G
    Fournier, JJA
    MICROPROCESSORS AND MICROSYSTEMS, 2003, 27 (09) : 421 - 430
  • [32] A new biometrics-based authentication protocol for smart card applications
    Elkamchouchi, Hassan M.
    Abouelseoud, Yasmine
    Shouaib, Wafaa S.
    INTERNATIONAL JOURNAL OF HEALTHCARE TECHNOLOGY AND MANAGEMENT, 2012, 13 (1-3) : 45 - 61
  • [33] A multilayered architecture for the development of smart card-based healthcare applications
    Georgoulas, A.
    Giakoumaki, A.
    Koutsouris, D.
    Proc. Annu. Int. Conf. IEEE Eng. Med. Biol. Soc. EMBS, (1378-1381):
  • [34] SMART-CARD APPLICATIONS HIDDEN PROBLEMS ADD TO DESIGNERS CHALLENGES
    LEGG, G
    EDN, 1992, 37 (05) : 83 - &
  • [35] Model-Driven Code Generation for Secure Smart Card Applications
    Moebius, Nina
    Stenzel, Kurt
    Grandy, Holger
    Reif, Wolfgang
    ASWEC 2009: 20TH AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2009, : 44 - 53
  • [36] Congress for Smart Card and Smart Objects
    不详
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2009, 126 (11): : A17 - A17
  • [37] Really smart card
    Johnstone, B
    FORBES, 1999, 163 (09): : 198 - 199
  • [38] Adiabatic smart card
    Mok, King-Keung
    Tsang, Ka-Hung
    Chan, Cheong-Fat
    Choy, Chiu-Sing
    Pun, Kong-Pang
    2006 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS, 2006, : 287 - +
  • [39] Smart Card 2000
    Pulzer, Matthew
    Engineering Technology, 2000, 3 (04):
  • [40] SMART CARD READER
    LIM, CH
    DAN, YH
    LAU, KT
    CHOO, KY
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 1993, 39 (01) : 6 - 12