Load Time Security Verification: The Claim Checker

Gadyatskaya, Olga and Lostal, Eduardo and Massacci, Fabio (2011) Load Time Security Verification: The Claim Checker. UNSPECIFIED.

[img]
Preview
PDF
Download (659Kb) | Preview

    Abstract

    Modern multi-application smart cards can become an integrated environment where applications from different providers are loaded on the fly and collaborate in order to facilitate lives of the cardholders. This initiative requires an embedded verification mechanism to ensure that all applications on the card respect the application interactions policy. The Security-by-Contract approach for loading time verification consists of two phases. During the first phase the loaded code is verified to be compliant with the supplied contract. Then, during the second phase the contract is matched with the smart card security policy. The report focuses on the first phase and describes an algorithm for static analysis of the loaded bytecode on Java Card. We also report about implementation of this algorithm that can be embedded on a real smart card.

    Item Type: Departmental Technical Report
    Department or Research center: Information Engineering and Computer Science
    Subjects: Q Science > QA Mathematics > QA075 Electronic computers. Computer science
    Uncontrolled Keywords: Security-by-Contract, load time verification, Java Card, embedded verifier, application interactions policy
    Report Number: DISI-11-471
    Repository staff approval on: 08 Aug 2011

    Actions (login required)

    View Item