Skip to main content

The PACAP Prototype: A Tool for Detecting Java Card Illegal Flow

  • Conference paper
  • First Online:
Java on Smart Cards:Programming and Security (JavaCard 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2041))

Included in the following conference series:

Abstract

This paper presents some practical issues of a joint project between Gemplus and ONERA. In this approach, a smart card issuer can verify that a new applet securely interacts with already loaded applets. A security policy has been defined that associates levels to applet attributes and methods and defines authorized flows between levels. We propose a technique based on model checking to verify that actual information flows between applets are authorized. In this paper, we focus on the development of the prototype of the analyzer and we present the first results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. P. Bieber and F. Cuppens. A Logical View of Secure Dependencies. Journal of Computer Security, 1(1):pp.99–129, 1992.

    Google Scholar 

  2. S. N. Freund and J. C. Mitchell. A type system for object initialization in the Java byte code language. In ACM Proceedings of OOPSLA 98, pp. 310–328, 1998.

    Google Scholar 

  3. P. Girard. Formalisation et mise en oeuvre d’une analyse statique de code en vue de la vérification d’applications sécurisées. Ph.D. thesis, ENSAE, 1996.

    Google Scholar 

  4. P. Girard. Which security policy for multi application smart cards? In USENIX workshop on smart card technology, 1999.

    Google Scholar 

  5. P. Girard, J.-L. Lanet. New Security Issues raised by Open Cards. In Information Security Technical Report, Vol4, No2, pp.: 19–27, 1999.

    Google Scholar 

  6. C. O’Halloran J. Cazin, P. Girard and C. T. Sennett. Formal Validation of Software for Secure Systems. In Anglo-French workshop on formal methods, modeling and simulation for system engineering, 1995.

    Google Scholar 

  7. T. Jensen, D. Le Metayer, and T. Thorn. Verification of control flow based security policies. In Proceedings of the 20th IEEE Security and Privacy Symposium, 1999.

    Google Scholar 

  8. X. Leroy and F. Rouaix. Security properties of typed applets. In Proceedings of POPL, 1998.

    Google Scholar 

  9. A.C. Myers and B. Liskov. A decentralized model for information flow control. In Proceedings of the 16th ACM symposium on operating systems principles, 1997.

    Google Scholar 

  10. J. Posegga and H. Vogt. Off line verification for Java byte code using a model checker. In Proceedings of ESORICS, number 1485 in LNCS. Springer, 1998.

    Google Scholar 

  11. G. Smith and D.M. Volpano. Secure information flow in a multi-threaded imperative language. In Proceedings of POPL, 1998.

    Google Scholar 

  12. R. Stata and M. Abadi. A type system for Java byte code subroutines. In Proceeding of 25th Symposium on Principles of Programming Languages, 1998.

    Google Scholar 

  13. P. Bieber, J. Cazin, P. Girard, J.-L. Lanet, V. Wiels, G. Zanon. Checking Secure Interactions of Smart Card Applets, ESORICS 2000, Toulouse, September 2000.

    Google Scholar 

  14. P. Bieber, J. Cazin, V. Wiels, G. Zanon, P. Girard, J.-L. Lanet. Electronic Purse Applet Certification in Workshops on Secure Architectures and Information Flow, London, December 1999. http://www.elsevier.nl/gej-ng/31/29/23/57/show/Products/notes/cover.htt

  15. C. Cifuentes, Reverse Compilation Techniques, Ph.D. Thesis, Queensland University of Technology, 1994.

    Google Scholar 

  16. T. Nipkow, Verified byte code verifier, T.U. München, http://www4.in.tum.de/~nipkow//pubs/fossacs01.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bieber, P. et al. (2001). The PACAP Prototype: A Tool for Detecting Java Card Illegal Flow. In: Attali, I., Jensen, T. (eds) Java on Smart Cards:Programming and Security. JavaCard 2000. Lecture Notes in Computer Science, vol 2041. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45165-X_3

Download citation

  • DOI: https://doi.org/10.1007/3-540-45165-X_3

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42167-2

  • Online ISBN: 978-3-540-45165-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics