java cards are embedded systems, very often implemented as smart cards. They are used in banking, e-government, telecommunication, and ticketing. Due to these use cases they have to provide a wide range of security me...
详细信息
ISBN:
(纸本)9780769537580
java cards are embedded systems, very often implemented as smart cards. They are used in banking, e-government, telecommunication, and ticketing. Due to these use cases they have to provide a wide range of security mechanisms and a high performance in relation to the available hardware cost. One of these security features is the transaction mechanism. It ensures that data in persistent memory stays consistent in case of the execution of the application is interrupted unexpectedly by e.g. loss of power. Such transaction mechanisms are very time consuming. Therefore, we1 propose a caching mechanisM for transactions. The mechanism uses a buffer located in RAM and reduces costly write cycles into persistent memory without any loss of security. In order to further increase the performance of this caching mechanism, we additionally introduce a concept to maximize the locality of selected java fields which are written very often.
Being a vital element for the different domains such as communication system, authentication, and payment, multiple attackers manipulate the card fraudulently in order to access to the services offered by this one. Sm...
详细信息
Being a vital element for the different domains such as communication system, authentication, and payment, multiple attackers manipulate the card fraudulently in order to access to the services offered by this one. Smartcards are often the target of software and hardware attacks. The most recent attacks are based on fault injection which modifies the application behavior. By disrupting the java card operation, the fault attack modifies the compiled code intended to be executed in order to meet what the attacker wants instead of the initial program. So, to tackle this problem, we suggest two classification and detection methods based on artificial intelligence, especially the neural and Bayesian networks. Then, we compare between the obtained results of these two methods in terms of the detection rate.
The paper describes an experiment in which a framework for model checking java byte code, combined with the application of runtime monitoring techniques through code rewriting, was used to guarantee correctness proper...
详细信息
The paper describes an experiment in which a framework for model checking java byte code, combined with the application of runtime monitoring techniques through code rewriting, was used to guarantee correctness properties of a java card applet.
This paper describes research in the use of the RMI to develop java card applications. the java card RMI(JCRMI), which is based on the J2 SE RMI distributed-object model. In the RMI model a server application creates ...
详细信息
This paper describes research in the use of the RMI to develop java card applications. the java card RMI(JCRMI), which is based on the J2 SE RMI distributed-object model. In the RMI model a server application creates and makes accessible remote objects, and a client application obtains remote references to the server's remote objects, and then invokes remote methods on them. In JCRMI, the java card applet is the server, and the host application is the client.
This paper describes research in the use of the RMI to develop java card applications. the java card RMI (JCRMI), which is based on the J2SE RMI distributed-object model. In the RMI model a server application creates ...
详细信息
This paper describes research in the use of the RMI to develop java card applications. the java card RMI (JCRMI), which is based on the J2SE RMI distributed-object model. In the RMI model a server application creates and makes accessible remote objects, and a client application obtains remote references to the server's remote objects, and then invokes remote methods on them. In JCRMI, the java card applet is the server, and the host application is the client.
The advent of the java card standard has been a major turning point in smart card technology. With the growing acceptance of this standard, understanding the performance behaviour of these platforms is becoming crucia...
详细信息
ISBN:
(纸本)9783540723530
The advent of the java card standard has been a major turning point in smart card technology. With the growing acceptance of this standard, understanding the performance behaviour of these platforms is becoming crucial. To meet this need, we present in this paper, a benchmark framework that enables performance evaluation at the bytecode level. The first experimental results show that bytecode execution time isolation is possible.
This paper presents implementation conditional access system for pay TV based on java card Conditional access system(CA) is widely used to control user access to system and protect the pay TV *** java smart card are i...
详细信息
This paper presents implementation conditional access system for pay TV based on java card Conditional access system(CA) is widely used to control user access to system and protect the pay TV *** java smart card are implement for access condition to system and Triple DES cryptography *** provide the functionality for secure,flexibility for management and easily to expand for value-add *** technology of java card is light weight bytecode to break the smart card memory *** is constrained memory resources.
Zero-knowledge authentication protocols are an alternative to authentication protocols based on public key cryptography. Low processing and memory consumption make them especially suitable for implementation in smart ...
详细信息
Zero-knowledge authentication protocols are an alternative to authentication protocols based on public key cryptography. Low processing and memory consumption make them especially suitable for implementation in smart card microprocessors, which are severely limited in processing power and memory space. This paper describes a design and implementation of a software library providing smart card application developers with a reliable authentication mechanism based on well-known zero-knowledge authentication schemes. java card is used as the target smart card platform implementation based on the evaluation of the Fiat-Shamir (F-S) and Guillou-Quisquater (G-Q) protocols under various performance criteria are presented to show the effectiveness of the implementation and that G-Q is a more efficient protocol.
暂无评论