This paper describes research in the use of the Security and Trust Services API for J2ME(SATSA) to develop mobile applications. for 3G networks. SATSA defines a set of APIs that allows J2 ME applications to communicat...
详细信息
This paper describes research in the use of the Security and Trust Services API for J2ME(SATSA) to develop mobile applications. for 3G networks. SATSA defines a set of APIs that allows J2 ME applications to communicate with and access functionality, secure storage and cryptographic operations provided by security elements such as smart cards and Wireless Identification Modules(WIM). A java card application could also work as an authentication module in a J2ME-based e-bank application. The e-bank application would allow its users to access their bank accounts using their cell phones.
We present a formal model of the java two's-complement integral arithmetics. The model directly formalizes the arithmetic operations as given in the java Language Specification (JLS). The algebraic properties of t...
详细信息
We present a formal model of the java two's-complement integral arithmetics. The model directly formalizes the arithmetic operations as given in the java Language Specification (JLS). The algebraic properties of these definitions are derived. Underspecifications and ambiguities in the JLS are pointed out and clarified. The theory is formally analyzed in Isabelle/HOL, that is, machine-checked proofs for the ring properties and divisor/remainder theorems etc. are provided. This work is suited to build the framework for machine-supported reasoning over arithmetic formulae in the context of java source-code verification.
We present the design and implementation of TINYSTORE, a persistent, transactional, garbage-collected memory-management system, designed to be called from the java virtual machine of a java card. The system is designe...
详细信息
We present the design and implementation of TINYSTORE, a persistent, transactional, garbage-collected memory-management system, designed to be called from the java virtual machine of a java card. The system is designed for flash-based implementations of java card, a variant of the java platform for smart cards. In the java card platform, objects are persistent by default. The platform supports transactions: a sequence of accesses to objects can be explicitly declared to constitute a transaction. TINYSTORE supports explicit transactions and atomically executes individual accesses that are not part of transactions;it also supports garbage collection, even on systems with a small constant amount of RAM. TINYSTORE uses a novel approach and specialized data structures to efficiently manage flash memory. We demonstrate its effectiveness by comparing it to a traditional EEPROM-based memory management system for java cards.
The paper presents an application developed for java card smart cards, with multiapplication support. Although the multiapplication support was not exemplified, the use of smart card for personal identification has so...
详细信息
The paper presents an application developed for java card smart cards, with multiapplication support. Although the multiapplication support was not exemplified, the use of smart card for personal identification has some advantages, the most important beeing its security. In this paper are shown the structure of the application, various security systems, which ensure the access to a robot mainframe to only the designated people, who have rights to control the specified robot.
Bytecode verification forms the corner stone of the java security model that ensures the integrity of the runtime environment even in the presence of untrusted code. Limited devices, like java smart cards, lack the ne...
详细信息
Bytecode verification forms the corner stone of the java security model that ensures the integrity of the runtime environment even in the presence of untrusted code. Limited devices, like java smart cards, lack the necessary amount of memory to verify the type-safety of java bytecode on their own. Proof carrying code techniques compute, outside the device, tamper-proof certificates which simplify bytecode verification and pass them along with the code. Rose has developed such an approach for a small subset of the java bytecode language. In this paper, we extend this approach to real world java software and develop a precise model of the memory requirements on the device. We use a variant of interval graphs to model liveness of memory regions in the checking step. Based on this model, memory-optimal checking strategies are computed outside the device and attached to the certificate. The underlying type system of the bytecode verifier has been augmented with multi-dimensional arrays and recognizes references to uninitialized java objects. Our detailed measurements, based on real world java libraries, demonstrate that the approach offers a substantial improvement in size of certificate over the similar approach taken by the KVM verifier. Worst case memory consumption on the device is examined as well and it turns out that the refinements based on our model save a significant amount of memory.
Multi-application smart cards enable a user to have multiple applications on her smart card. The growing trend of services convergence fuelled by the Near Field Communication and smartphones has made multi-application...
详细信息
ISBN:
(纸本)9781479909735
Multi-application smart cards enable a user to have multiple applications on her smart card. The growing trend of services convergence fuelled by the Near Field Communication and smartphones has made multi-application smart cards a tangible reality. In such an environment, cardholders might have number of applications on their smart cards and in case they lose the smart card, they would lose all of the applications. Currently, the recovery of a smart card based service might take from a day to a week at best, during which time the service provider might lose on business from the user because she is not able to access the respective services. The proposed framework in this paper enables a user to acquire a new smart card as she desires and then migrate/restore all of her applications onto it - facilitating her to recover from her lost digital wallet in a secure, efficient, seamless and ubiquitous manner.
Notions like security, trust, and privacy are crucial in the digital environment and in the future, with the advent of technologies like the Internet of Things (IoT) and Cyber-Physical Systems (CPS), their importance ...
详细信息
ISBN:
(纸本)9781509032068
Notions like security, trust, and privacy are crucial in the digital environment and in the future, with the advent of technologies like the Internet of Things (IoT) and Cyber-Physical Systems (CPS), their importance is only going to increase. Trust has different definitions, some situations rely on real-world relationships between entities while others depend on robust technologies to gain trust after deployment. In this paper we focus on these robust technologies, their evolution in past decades and their scope in the near future. The evolution of robust trust technologies has involved diverse approaches, as a consequence trust is defined, understood and ascertained differently across heterogeneous domains and technologies. In this paper we look at digital trust technologies from the point of view of security and examine how they are making secure computing an attainable reality. The paper also revisits and analyses the Trusted Platform Module (TPM), Secure Elements (SE), Hypervisors and Virtualisation, Intel TXT, Trusted Execution Environments (TEE) like GlobalPlatform TEE, Intel SGX, along with Host card Emulation, and Encrypted Execution Environment (E3). In our analysis we focus on these technologies and their application to the emerging domains of the IoT and CPS.
暂无评论