Skip to main content

CardKt: Automated Multi-modal Deduction on Java Cards for Multi-application Security

  • Conference paper
  • First Online:
Java on Smart Cards:Programming and Security (JavaCard 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2041))

Included in the following conference series:

  • 453 Accesses

Abstract

We describe an implementation of a Java program to perform automated deduction in propositional multi-modal logics on a Java smart card. The tight space limits of Java smart cards make the implementation non-trivial. A potential application is to ensure that applets down-loaded off the internet conform to personalised security permissions stored on the Java card using a security policy encoded in multi-modal logic. In particular, modal logic may be useful to ensure that previously checked “trust” relationships between pre-existing multiple applets on a Java card are not broken by the addition of a new applet. That is, by using multi-modal logic to express notions of permissions and obligations, we can turn the security check into an on-board theorem proving task. Our theorem prover itself could be down-loaded “just in time” to perform the check, and then deleted to free up space on the card once the check has been completed. Our work is thus a “proof of principle” for the application of formal logic to the security of multi-application Java cards.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. N Bonnette and R Goré. A labelled sequent system for tense logic Kt. In AI98: Proceedings of the Australian Joint Conference on Artificial Intelligence, LNAI 1502:71–82. Springer, 1998.

    Google Scholar 

  2. V Boyapati and R Goré. System description: KtSeqC. In N. Murray, editor, Proc. International Conference on Theorem Proving with Analytic Tableau, volume LNCS 1617: 29–31. Springer, 1999.

    Google Scholar 

  3. P Blackburn. Nominal tense logic. Notre Dame Journal of Formal Logic, 34(1):56–83, 1993.

    Article  MATH  MathSciNet  Google Scholar 

  4. P Girard. Which security policy for multiapplication smart cards. In Proceedings USENIX Workshop on Smartcard Technology, pages 21–28, Chicago, USA, 1999.

    Google Scholar 

  5. G Grimaud, J-L Lanet, and J-J Vandewalle. FACADE: a typed intermediate language dedicated to smart cards. Technical report, Gemplus Research, http://www.gemplus.com/smart/r_d/publications/index.html,1999.

  6. R. I. Goldblatt. Logics of Time and Computation. CSLI Lecture Notes No. 7, Center for the Study of Language and Information, Stanford, 1987.

    Google Scholar 

  7. R Goré. Chapter 6: Tableau methods for modal and temporal logics. In M D’Agostino, D Gabbay, R Hänle, J Posegga, editor, Handbook of Tableau Methods, pages 297–396. Kluwer Academic Publishers, 1999.

    Google Scholar 

  8. G. E. Hughes and M. J. Cresswell. A New Introduction To Modal Logic. Routledge, 1996.

    Google Scholar 

  9. Funge Inc. http://www.funge.net/, 1999.

  10. B Lampson M Abadi, M Burrows and G Plotkin. A calculus for access control in distributed systems. AM Transactions on Programming Languages and Systems, 15(3):1–29, 1993.

    Google Scholar 

  11. A Mathuria. Contributions to Authentication Logics and Analysis of Authentication Protocols. PhD thesis, School of Information Technology and Computer Science, University of Wollongong, Australia, 1997.

    Google Scholar 

  12. M Abadi M Burrows and R Needham. A logic of authentication. ACM Transactions on Computer Systems, 8:18–36, 1990.

    Article  Google Scholar 

  13. Sun Microsystems. Sun’s java web site. http://www.java.sun.com, 2000.

  14. G Necula. Proof-carrying code. In Proc. of 24th Annual Symposium on Principles Of Programming Languages, 1997.

    Google Scholar 

  15. P Girard J-L Lanet V Wiels G Zanon P Bieber, J Cazin. Checking secure interactions of smart card applets. Technical report, Gemplus R&D Centre, 2000. http://www.gemplus.com/smart/r_d/projects/pacap.htm.

  16. C C Peter. http://www.cityu.edu.hk/computer/c3_smartcard.htm.

  17. A Rao and M Georgeff. A model-theoretic approach to the verification of situated reasoning systems. In Proceedings of the Thirteenth International Joint Conference on Artificial Intelligence (IJCAI-93), pages 318–324. Morgan-Kauffman, 1993.

    Google Scholar 

  18. A Slater, R Goré, J Posegga, and H Vogt. CardTAP: Automated theorem proving on a smart card. In AI98: Proceedings of the Australian Joint Conference on Artificial Intelligence, LNAI 1502:239–248. Springer, 1998.

    Google Scholar 

  19. G F. Shvarts. Autoepistemic modal logics. In Rohit Parikh, editor, Theoretical Aspects About Reasoning About Knowledge, pages 97–109, 1990.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Goré, R., Nguyen, L.D. (2001). CardKt: Automated Multi-modal Deduction on Java Cards for Multi-application Security. In: Attali, I., Jensen, T. (eds) Java on Smart Cards:Programming and Security. JavaCard 2000. Lecture Notes in Computer Science, vol 2041. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45165-X_4

Download citation

  • DOI: https://doi.org/10.1007/3-540-45165-X_4

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42167-2

  • Online ISBN: 978-3-540-45165-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics