Confidentiality for mobile code: The case of a simple payment protocol

被引:17
|
作者
Dam, M [1 ]
Giambiagi, P [1 ]
机构
[1] KTH, IT, Dept Teleinformat, S-16440 Kista, Sweden
关键词
D O I
10.1109/CSFW.2000.856940
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential information onto a public network has a rich set of direct and indirect channels available to it. The problem is to constrain applet behaviour to prevent those leakages that are unintended while preserving those that are specified in the protocol. We use an approach based on the idea of correlating changes in observable behaviour with changes in input. In the special case where no changes in (low) behaviour are possible we retrieve a version of noninterference. Mapping our approach to JVM a number of particular concerns need to be addressed including the use of object libraries for IO, the use of labelling to track input/output of secrets, and the choice of proof strategy: We use the bisimulation proof technique. To provide user feedback we employ a variant of proof-carrying code to instrument a security assistant which will let users of an applet inquire about its security properties such as the destination of data input into different fields.
引用
收藏
页码:233 / 244
页数:4
相关论文
共 50 条
  • [1] A Fair Mobile Payment Protocol
    Fan, Wei
    Shu, Huaying
    Yan, Qiang
    Wang, Fang
    CHALLENGES FOR NEXT GENERATION NETWORK OPERATIONS AND SERVICE MANAGEMENT, PROCEEDINGS, 2008, 5297 : 466 - 469
  • [2] Secure Authentication Protocol for Mobile Payment
    Kai Fan
    Hui Li
    Wei Jiang
    Chengsheng Xiao
    Yintang Yang
    Tsinghua Science and Technology, 2018, 23 (05) : 610 - 620
  • [3] A private and efficient mobile payment protocol
    Wang, CJ
    Leung, HF
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 1030 - 1035
  • [4] A system model and protocol for mobile payment
    Liu, J
    Liao, JX
    Zhu, XM
    ICEBE 2005: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2005, : 638 - 641
  • [5] Secure Authentication Protocol for Mobile Payment
    Fan, Kai
    Li, Hui
    Jiang, Wei
    Xiao, Chengsheng
    Yang, Yintang
    TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 610 - 620
  • [6] An Efficient and Flexible Mobile Payment Protocol
    Chang, Chin-Chen
    Yang, Jen-Ho
    Chang, Kai-Jie
    2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, : 63 - 66
  • [7] A secure protocol for a payment system based on a kiosk centric case mobile scenario
    Tellez, Jesus A.
    Sierra, Jose M.
    Izquierdo, Antonio
    Carbonell, Mildrey
    INGENIERIA UC, 2006, 13 (02): : 25 - 32
  • [8] Mobile Payment Protocol Based on Dynamic Mobile Phone Token
    Zhang, Xuewang
    Zeng, Hao
    Zhang, Xuewang
    2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 680 - 685
  • [9] A novel fair mobile payment protocol applicable to mobile environment
    Gao, Yue-Xiang
    Peng, Dai-Yuan
    Tang, Peng-Zhi
    Tiedao Xuebao/Journal of the China Railway Society, 2013, 35 (11): : 51 - 59
  • [10] A New Anonymous Unlinkable Mobile Payment Protocol
    Zamanian, Farahnaz
    Mala, Hamid
    2016 6TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2016, : 117 - 122