Verifying smart card applications An ASM approach

被引:0
|
作者
Haneberg, Dominik [1 ]
Grandy, Holger [1 ]
Reif, Wolfgang [1 ]
Schellhorn, Gerhard [1 ]
机构
[1] Univ Augsburg, Inst Informat, Lehrstuhl Softwaretech & Programmiersprachen, D-86135 Augsburg, Germany
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present PROSECCO1, a formal model for security protocols of smart card applications, based on Abstract State Machines (ASM) [BS03]JGur95], and a suitable method for verifying security properties of such protocols. The main part of this article describes the structure of the protocol ASM and all its relevant parts. Our modeling technique enables an attacker model exactly tailored to the application, instead of only an attacker similar to the Dolev-Yao model. We also introduce a proof technique for security properties of the protocols. Properties are proved in the KIV system using symbolic execution and invariants. Furthermore we describe a graphical notation based on UML diagrams that allows to specify the important parts of the application in a simple way. Our formal approach is exemplified with a small e-commerce application. We use an electronic wallet to demonstrate the ASM-based protocol model and we also show what the proof obligations of some of the security properties look like.
引用
收藏
页码:313 / 332
页数:20
相关论文
共 50 条
  • [41] POLYPHONIC SMART CARD
    Calfa, Ana-Maria
    CAS: 2008 INTERNATIONAL SEMICONDUCTOR CONFERENCE, PROCEEDINGS, 2008, : 419 - 422
  • [42] Party smart card
    Barrington J. Bayley
    Nature, 2006, 440 : 714 - 714
  • [44] Smart card evolution
    Shelfer, KM
    Procaccino, JD
    COMMUNICATIONS OF THE ACM, 2002, 45 (07) : 83 - 88
  • [45] SMART CARD APPLICATIONS AND TECHNOLOGY CONFERENCE-89 - SOLUTIONS FOR USE OF MULTIPLE VENDOR SMART CARDS
    EPSTEIN, SD
    SCAT 89 : SMART CARD APPLICATIONS AND TECHNOLOGY / ASIT 89 : ADVANCED SECURITY AND IDENTIFICATION TECHNOLOGY: CONFERENCE PROCEEDINGS, 1989, : A53 - A59
  • [46] Hardwaresicherheit von Smart Card ICsHardware security of smart-card ICs
    S. Philipp
    e&i Elektrotechnik und Informationstechnik, 2001, 118 (10) : 477 - 480
  • [47] Robust password and smart card based authentication scheme with smart card revocation
    Xie Q.
    Liu W.-H.
    Wang S.-B.
    Hu B.
    Dong N.
    Yu X.-Y.
    Journal of Shanghai Jiaotong University (Science), 2014, 19 (04) : 418 - 424
  • [48] A Java']Java Card Based Approach for Smart Meter Gateway Security
    Piska, Srinivas
    Shetty, Manasa
    2013 IEEE INNOVATIVE SMART GRID TECHNOLOGIES - ASIA (ISGT ASIA), 2013,
  • [49] A sociotechnical approach to smart card systems design: An Australian case study
    Cooper, J
    Gencturk, N
    Lindley, RA
    BEHAVIOUR & INFORMATION TECHNOLOGY, 1996, 15 (01) : 3 - 13
  • [50] Smart card technology - Hong Kong: Legal issues in smart card technology
    Alder, Edward
    Computer Law and Security Report, 2002, 18 (02): : 120 - 123