Despite the increased use of smartcards in many areas of everyday life the secure interoperability of these devices still remains a significant challenge. Common Criteria certification ensures the secure operation of a particular smartcard in a specific and closed environment and does not explicitly consider potential problems in more open environments where different types of smartcards and their corresponding applications are present at the same time. Since both the range of smartcard applications and the issuing manufacturers continue to grow, the interoperability of smartcards cannot be satisfactorily addressed in an isolated testing and certification environment. Ideally, one should be able to certify that adding a new type of smartcard and a new smartcard application to a such environment is safe without interoperability problems. To conduct this research, we focus on digital signature applications on Common Criteria certified smartcards. We investigated the vulnerabilities of smartcards in such open environments and possible ways to identify and eliminate those using Model Checking approaches. Here we simulate the interaction of many smartcards which interact with their applications via a common middleware. Each smartcard is assumed to execute a Straight Line Program which consists of a series of states or nodes connected by transitions (no loops). We discuss how these results can be taken into account in the design of new types of middleware which can identify and suppress anomalous transitions. These results will help to design systems that support multiple smartcards types and applications simultaneously and securely. © 2013 IEEE.

Talamo, M., Galinium, M., Schunck, C., Arcieri, F. (2013). Simulation based verification of concurrent processing on security devices. In SYS CON 2013: 7th Annual IEEE International systems conference: proceedings (pp.82-87). IEEE [10.1109/SysCon.2013.6549863].

Simulation based verification of concurrent processing on security devices

TALAMO, MAURIZIO;SCHUNCK, CHRISTIAN;
2013-01-01

Abstract

Despite the increased use of smartcards in many areas of everyday life the secure interoperability of these devices still remains a significant challenge. Common Criteria certification ensures the secure operation of a particular smartcard in a specific and closed environment and does not explicitly consider potential problems in more open environments where different types of smartcards and their corresponding applications are present at the same time. Since both the range of smartcard applications and the issuing manufacturers continue to grow, the interoperability of smartcards cannot be satisfactorily addressed in an isolated testing and certification environment. Ideally, one should be able to certify that adding a new type of smartcard and a new smartcard application to a such environment is safe without interoperability problems. To conduct this research, we focus on digital signature applications on Common Criteria certified smartcards. We investigated the vulnerabilities of smartcards in such open environments and possible ways to identify and eliminate those using Model Checking approaches. Here we simulate the interaction of many smartcards which interact with their applications via a common middleware. Each smartcard is assumed to execute a Straight Line Program which consists of a series of states or nodes connected by transitions (no loops). We discuss how these results can be taken into account in the design of new types of middleware which can identify and suppress anomalous transitions. These results will help to design systems that support multiple smartcards types and applications simultaneously and securely. © 2013 IEEE.
Annual IEEE International Systems Conference (SysCon), 7.
Orlando (FL, USA)
2013
7.
Rilevanza internazionale
contributo
15-apr-2013
2013
Settore ING-INF/05 - SISTEMI DI ELABORAZIONE DELLE INFORMAZIONI
Settore INF/01 - INFORMATICA
English
Intervento a convegno
Talamo, M., Galinium, M., Schunck, C., Arcieri, F. (2013). Simulation based verification of concurrent processing on security devices. In SYS CON 2013: 7th Annual IEEE International systems conference: proceedings (pp.82-87). IEEE [10.1109/SysCon.2013.6549863].
Talamo, M; Galinium, M; Schunck, C; Arcieri, F
File in questo prodotto:
File Dimensione Formato  
2013 Simulation Based Verification of.pdf

solo utenti autorizzati

Licenza: Non specificato
Dimensione 585.01 kB
Formato Adobe PDF
585.01 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2108/108667
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? 1
social impact