06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

9.1 Introduction<br />

9.1 Introduction<br />

One of the main features of the UCOM is dynamic (wherever, whenever) acquisition of<br />

applications by users. There<strong>for</strong>e, the UCOM framework enables a user to have most if not<br />

all of her applications on a single device. However, this also increases the potential damage<br />

if the device is lost. To expedite the recovery process after theft or loss, customers should<br />

be able to have their applications restored as quickly as possible to a new devices.<br />

A backup mechanism enables a user to backup her smart card contents. In adverse circumstances,<br />

such as losing her smart card, she could retrieve and restore the contents onto a<br />

new smart card. Furthermore, a similar mechanism referred to as a migration mechanism<br />

can also be used if a user decides to upgrade to a new feature-rich UCTD.<br />

There are some subtle challenges to backup and migration mechanisms in the UCOM, especially<br />

in the case of card-bound application leases (section 5.4.3) that restrict applications<br />

to their host smart cards. Furthermore, there is a possibility that the remote location (e.g.<br />

backup server) might not be tamper-proof and a malicious user could take advantage of it.<br />

There<strong>for</strong>e, it would be safe to assume that instead of transferring whole applications (i.e.<br />

code and data), we should only transfer application download credentials. These credentials<br />

can be considered as authorisation tokens that are issued by the respective SPs, so a<br />

user could use them to acquire the application in future.<br />

Finally, we discuss the last lifecycle stage of an application application deletion. As the<br />

UCOM allows a user to install and delete any application they desire, this privilege might<br />

lead to feature interaction problems discussed as SCR8 and SPR9 in section 3.5. Feature<br />

interaction problems arise from environments where two applications share resources and<br />

later at some point one of the applications is deleted. The second application's dependencies<br />

on the rst application might not be resolved, which leads to a situation where<br />

the second application tries to access the rst application, which no longer exists on the<br />

plat<strong>for</strong>m. Such scenarios may lead to possible security breaches in the UCTD environment.<br />

We analyse the application deletion process in prominent smart card frameworks: Java<br />

Card, GlobalPlat<strong>for</strong>m, and Multos, focusing on how they resolve deadlock conditions. A<br />

deadlock condition arises when a user tries to delete an application `A' which is sharing resources<br />

with an application `B'. Deleting the application `A' might aect the operations of<br />

the application `B', eventually leading to a feature interaction problem. To avoid such scenarios,<br />

we propose a framework that tries to resolve such deadlocks during the application<br />

deletion process.<br />

Structure of the Chapter: Section 9.2 begins with a discussion on smart card contents<br />

backup and migration mechanisms, followed by the application deletion process in section<br />

212

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!