06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

7.8 Summary<br />

7.8 Summary<br />

In this chapter, we discussed popular smart card-based rewall mechanisms and how they<br />

work. Then we described the unique requirements of the UCTD and presented a rewall<br />

mechanism extended from the Java Card rewall. Based on the proposed rewall architecture,<br />

we proposed a protocol that establishes the binding between two applications residing<br />

on the same smart card. Furthermore, we extended this rewall mechanism to accommodate<br />

cross-device application sharing in which two applications residing on dierent UCTDs<br />

can still share their resources. To support cross-device application sharing, we proposed two<br />

protocols, one <strong>for</strong> plat<strong>for</strong>m binding and the second <strong>for</strong> application binding: PBP and ABPD<br />

respectively. We then in<strong>for</strong>mally analysed the proposed protocols and this analysis was<br />

subsequently extended to mechanical <strong>for</strong>mal analysis by the CasperFDR. Finally, we discussed<br />

the test implementation and per<strong>for</strong>mance measurements of the proposed protocols.<br />

186

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!