06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 8<br />

Smart Card Runtime Environment<br />

Contents<br />

8.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188<br />

8.2 Smart Card Runtime Environment . . . . . . . . . . . . . . . . . 189<br />

8.3 Runtime Protection Mechanism . . . . . . . . . . . . . . . . . . . 194<br />

8.4 Analysis of the Runtime Protection Mechanism . . . . . . . . . 205<br />

8.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209<br />

In this chapter we discuss the <strong>User</strong> <strong>Centric</strong> <strong>Tamper</strong>-<strong>Resistant</strong> Device (UCTD) execution<br />

environment in which the downloaded applications will execute. We begin by describing the<br />

Java Card runtime environment associated operations. Later on, we articulate the threat<br />

model <strong>for</strong> the UCTD execution environment, along with how it is aggravated by the openness<br />

of the UCTD. Subsequently, we look at counter-measures that can be deployed to provide a<br />

secure and reliable execution plat<strong>for</strong>m. The discussed counter-measures are then compared<br />

in terms of their eectiveness and per<strong>for</strong>mance.<br />

187

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!