2005
DOI: 10.1007/11554578_5
|View full text |Cite
|
Sign up to set email alerts
|

Formal Methods for Smartcard Security

Abstract: Abstract. Smartcards are trusted personal devices designed to store and process confidential data, and to act as secure tokens for providing access to applications and services. Smartcards are widely deployed and their usage spans over several application domains including banking, telecommunications, and identity.Open platform smartcards are new generation trusted personal devices with increased flexibility. Such devices, which benefit of increased connectivity and increased interoperability, can host several… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2007
2007
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 83 publications
0
2
0
Order By: Relevance
“…In the following, we describe our new corruption model in more detail. 5 Let P be the set of main parties of a protocol π. At the first activation, the adversary A may only send a physical-attack instruction that enables him to gain control over parties regardless of the protocol architecture.…”
Section: Corruption Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…In the following, we describe our new corruption model in more detail. 5 Let P be the set of main parties of a protocol π. At the first activation, the adversary A may only send a physical-attack instruction that enables him to gain control over parties regardless of the protocol architecture.…”
Section: Corruption Modelmentioning
confidence: 99%
“…In order to protect from remotely exploitable vulnerabilities, we suggest to use formal verification wherever possible. There exists a vast body in the literature that is applicable to the implementations we discuss below, like smart cards ( [2,5]), cryptographic implementations in the IoT world [45], FPGAs and ASICs [9,20] or microkernels [26,31]. Due to the very low complexity of the cryptographic core, formal verification is applicable in practice for our modules.…”
Section: Implementations Of Remotely Unhackable Hardware Modulesmentioning
confidence: 99%