Abstract
This paper presents some practical issues of a joint project between Gemplus and ONERA. In this approach, a smart card issuer can verify that a new applet securely interacts with already loaded applets. A security policy has been defined that associates levels to applet attributes and methods and defines authorized flows between levels. We propose a technique based on model checking to verify that actual information flows between applets are authorized. In this paper, we focus on the development of the prototype of the analyzer and we present the first results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
P. Bieber and F. Cuppens. A Logical View of Secure Dependencies. Journal of Computer Security, 1(1):pp.99–129, 1992.
S. N. Freund and J. C. Mitchell. A type system for object initialization in the Java byte code language. In ACM Proceedings of OOPSLA 98, pp. 310–328, 1998.
P. Girard. Formalisation et mise en oeuvre d’une analyse statique de code en vue de la vérification d’applications sécurisées. Ph.D. thesis, ENSAE, 1996.
P. Girard. Which security policy for multi application smart cards? In USENIX workshop on smart card technology, 1999.
P. Girard, J.-L. Lanet. New Security Issues raised by Open Cards. In Information Security Technical Report, Vol4, No2, pp.: 19–27, 1999.
C. O’Halloran J. Cazin, P. Girard and C. T. Sennett. Formal Validation of Software for Secure Systems. In Anglo-French workshop on formal methods, modeling and simulation for system engineering, 1995.
T. Jensen, D. Le Metayer, and T. Thorn. Verification of control flow based security policies. In Proceedings of the 20th IEEE Security and Privacy Symposium, 1999.
X. Leroy and F. Rouaix. Security properties of typed applets. In Proceedings of POPL, 1998.
A.C. Myers and B. Liskov. A decentralized model for information flow control. In Proceedings of the 16th ACM symposium on operating systems principles, 1997.
J. Posegga and H. Vogt. Off line verification for Java byte code using a model checker. In Proceedings of ESORICS, number 1485 in LNCS. Springer, 1998.
G. Smith and D.M. Volpano. Secure information flow in a multi-threaded imperative language. In Proceedings of POPL, 1998.
R. Stata and M. Abadi. A type system for Java byte code subroutines. In Proceeding of 25th Symposium on Principles of Programming Languages, 1998.
P. Bieber, J. Cazin, P. Girard, J.-L. Lanet, V. Wiels, G. Zanon. Checking Secure Interactions of Smart Card Applets, ESORICS 2000, Toulouse, September 2000.
P. Bieber, J. Cazin, V. Wiels, G. Zanon, P. Girard, J.-L. Lanet. Electronic Purse Applet Certification in Workshops on Secure Architectures and Information Flow, London, December 1999. http://www.elsevier.nl/gej-ng/31/29/23/57/show/Products/notes/cover.htt
C. Cifuentes, Reverse Compilation Techniques, Ph.D. Thesis, Queensland University of Technology, 1994.
T. Nipkow, Verified byte code verifier, T.U. München, http://www4.in.tum.de/~nipkow//pubs/fossacs01.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bieber, P. et al. (2001). The PACAP Prototype: A Tool for Detecting Java Card Illegal Flow. In: Attali, I., Jensen, T. (eds) Java on Smart Cards:Programming and Security. JavaCard 2000. Lecture Notes in Computer Science, vol 2041. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45165-X_3
Download citation
DOI: https://doi.org/10.1007/3-540-45165-X_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42167-2
Online ISBN: 978-3-540-45165-5
eBook Packages: Springer Book Archive