06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

7.2 Application Sharing Mechanism<br />

allows the SPs to control their applications' behaviours, especially in terms of<br />

on-card and o-card communication.<br />

(b) Plat<strong>for</strong>m to Application Communication: Java Card (like other multi-application<br />

smart cards) provides global access rights to the plat<strong>for</strong>m. The global access<br />

rights mean that an object of the JCRE System Context can access any method<br />

(object) in any of the application contexts. However, the Java Card specication<br />

explicitly notes that the plat<strong>for</strong>m should only access certain methods<br />

(select, process, deselect, or getShareableInterfaceObject) from an applet<br />

context [28]. In the UCOM, the rewall should ensure that a plat<strong>for</strong>m<br />

cannot have access to methods that are not sanctioned by the application SPs.<br />

Furthermore, it should enable an object or method to verify the requesting<br />

source. For example if the source is the plat<strong>for</strong>m, and it is trying to access<br />

an object or method not sanctioned by the corresponding SP, then it should<br />

throw a security exception.<br />

FiR-7 Sharing Revocation: A server (or client) application can revoke a privilege, even<br />

after the server and the client have established a sharing relationship with each<br />

other. In Multos and Java Card, the only way to revoke privileges is to modify the<br />

server and/or client-application code. If a server application does not want to share<br />

resource with the client application, then the server application has to implement<br />

adequate checks to throw an error or exception when the client application accesses<br />

the resources. From the client application's point of view, the SP has to modify the<br />

client application so that it cannot use the shareable resources.<br />

FiR-8 <strong>User</strong>'s Privacy: The rewall mechanism should not allow an application to discover<br />

the existence of other applications, because such a privilege could be used to prole<br />

a user, perhaps <strong>for</strong> marketing or fraudulent purposes. In Java Card, public static<br />

AID lookupAID can be used to list the installed applications. It is not an issue in<br />

the ICOM as there is a central authority (card issuer) that has prior knowledge<br />

of installed applications and (to some extent)their functionality. However, it is a<br />

potential privacy threat in the UCTD environment.<br />

The comparison between Java Card, Multos and the proposed rewall mechanism is illustrated<br />

in table 7.1.<br />

7.2.3.1 Why Cross-Device Application Sharing?<br />

With increasing interconnectivity between dierent computing environments, applications<br />

installed on dierent UCTDs can enable new service models by having a secure and reliable<br />

resource sharing mechanism. These are referred to as Cross-Device Application Sharing<br />

Mechanism (CDAM). Some of the possible applications of CDAM are listed below:<br />

163

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!