06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

5.5 Card Management-Related Issues<br />

5.5.3 Parasite Application Problem<br />

In the parasite application problem, an installed application masquerades as the UCTD<br />

on which it is installed. This is possible because a UCTD allows an installed application<br />

to request the plat<strong>for</strong>m/application state validation from the TEM (section 4.3).<br />

Service Provider<br />

3) Request<br />

Validation<br />

6) Application<br />

Download<br />

5) Validation<br />

Proof<br />

2) Request<br />

Validation<br />

1) Request<br />

Application<br />

App Malicious<br />

4) Validation<br />

Smart Card Runtime Environment<br />

Trusted Environment & Execution Manager (TEM)<br />

<strong>User</strong> <strong>Centric</strong> <strong>Tamper</strong>-<strong>Resistant</strong> Device<br />

7) Transfer<br />

Application Off-card<br />

3a) Request Online<br />

Validation<br />

3b) Online<br />

Validation<br />

Figure 5.5: Illustration of parasite application problem<br />

Malicious <strong>User</strong><br />

Smart Card<br />

Manufacturer<br />

In this attack as shown in gure 5.5, an adversary (A) installs his malicious application<br />

(App Malicious ) on a UCTD. The App Malicious implements the application download protocols<br />

that are discussed in chapter 6. The A then requests the installation of an application<br />

from its SP through the App Malicious , represented by message one in the gure 5.5. In<br />

response, the SP asks the UCTD of security validation to avoid a simulator attack and this<br />

request is sent to the App Malicious . The App Malicious then asks the TEM <strong>for</strong> the security<br />

validation (section 4.4.3). At the successful conclusion of the security validation process,<br />

the card manufacturer produces a certicate that <strong>for</strong> privacy reasons does not include<br />

the identity of the requesting SP as described in the online attestation protocol (section<br />

4.7). There<strong>for</strong>e, the App Malicious can communicate this certicate to the requesting SP<br />

as validation in message ve (gure 5.5) and may be able to start the application download<br />

process. The A might have designed the application as if it will communicate the<br />

downloaded application o-card, which will enable A to retrieve the application code and<br />

data.<br />

To avoid this problem, there are four possible solutions: 1) restrict the security assurance<br />

validation request to o-card entities and any installed applications should not be allowed<br />

to request it, 2) include the identity of the requesting SP in the security assurance validation<br />

certicate during the application installation process, 3) include the identity of<br />

the application requesting the security assurance validation during the application installation,<br />

the request is initiated by the card security manager discussed in section 4.2.2, or<br />

4) avoid generating the signature as part of the security validation if it is requested by an<br />

application, but use the shared keys between the TEM and the application.<br />

125

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!