06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CONTENTS<br />

7 Application Sharing Mechanisms 157<br />

7.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158<br />

7.2 Application Sharing Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . 159<br />

7.2.1 Firewall Mechanism in Java Card . . . . . . . . . . . . . . . . . . . . 159<br />

7.2.2 Firewall Mechanism in Multos . . . . . . . . . . . . . . . . . . . . . . 160<br />

7.2.3 Rationale <strong>for</strong> <strong>User</strong> <strong>Centric</strong> Smart Card Firewall . . . . . . . . . . . . 161<br />

7.3 UCTD Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165<br />

7.3.1 Firewall Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . 165<br />

7.3.2 Application Binding . . . . . . . . . . . . . . . . . . . . . . . . . . . 166<br />

7.3.3 Using Shareable Resources . . . . . . . . . . . . . . . . . . . . . . . . 167<br />

7.3.4 Privilege Modication . . . . . . . . . . . . . . . . . . . . . . . . . . 168<br />

7.3.5 Application-Plat<strong>for</strong>m Communication . . . . . . . . . . . . . . . . . 168<br />

7.3.6 Cross-Device Application Sharing . . . . . . . . . . . . . . . . . . . . 169<br />

7.3.7 Minimum Goals and Requirements <strong>for</strong> the Proposed Protocols . . . . 171<br />

7.3.8 Protocol Notation and Terminology . . . . . . . . . . . . . . . . . . . 173<br />

7.3.9 Enrolment Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173<br />

7.4 Application Binding Protocol Local . . . . . . . . . . . . . . . . . . . . . 174<br />

7.4.1 Protocol Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . 174<br />

7.4.2 Protocol Description . . . . . . . . . . . . . . . . . . . . . . . . . . . 175<br />

7.5 Plat<strong>for</strong>m Binding Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176<br />

7.5.1 Protocol Prerequisite . . . . . . . . . . . . . . . . . . . . . . . . . . . 176<br />

7.5.2 Protocol Description . . . . . . . . . . . . . . . . . . . . . . . . . . . 176<br />

7.6 Application Binding Protocol Distributed . . . . . . . . . . . . . . . . . . 178<br />

7.6.1 Protocol Prerequisite . . . . . . . . . . . . . . . . . . . . . . . . . . . 179<br />

7.6.2 Protocol Description . . . . . . . . . . . . . . . . . . . . . . . . . . . 179<br />

7.7 Analysis of the Proposed Protocols . . . . . . . . . . . . . . . . . . . . . . . 181<br />

7.7.1 In<strong>for</strong>mal Analysis of the Proposed Protocols . . . . . . . . . . . . . . 181<br />

7.7.2 Revisiting the Requirements and Goals . . . . . . . . . . . . . . . . . 182<br />

7.7.3 CasperFDR Analysis of the Proposed Protocols . . . . . . . . . . . . 184<br />

7.7.4 Implementation Results and Per<strong>for</strong>mance Measurements . . . . . . . 184<br />

7.8 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186<br />

8 Smart Card Runtime Environment 187<br />

8.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188<br />

8.2 Smart Card Runtime Environment . . . . . . . . . . . . . . . . . . . . . . . 189<br />

8.2.1 Java Card Virtual Machine . . . . . . . . . . . . . . . . . . . . . . . 189<br />

8.2.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192<br />

8.3 Runtime Protection Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . 194<br />

8.3.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194<br />

8.3.2 Attacker's Capability . . . . . . . . . . . . . . . . . . . . . . . . . . . 196<br />

8.3.3 Overview of the Runtime Protection Mechanism . . . . . . . . . . . 197<br />

8.3.4 Application Compilation . . . . . . . . . . . . . . . . . . . . . . . . . 198<br />

8.3.5 Execution Environment . . . . . . . . . . . . . . . . . . . . . . . . . 199<br />

8.3.6 Runtime <strong>Security</strong> Manager . . . . . . . . . . . . . . . . . . . . . . . 199<br />

8.3.7 Runtime <strong>Security</strong> Counter-Measures . . . . . . . . . . . . . . . . . . 200<br />

8.4 Analysis of the Runtime Protection Mechanism . . . . . . . . . . . . . . . . 205<br />

8.4.1 <strong>Security</strong> Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205<br />

8.4.2 Evaluation Context . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207<br />

8.4.3 Latency Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207<br />

8.4.4 Per<strong>for</strong>mance Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 208<br />

11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!