06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

9.3 Application Deletion<br />

tion of the SP. There<strong>for</strong>e, after evaluating the operational and security capabilities of the<br />

destination smart card, the SP can continue and lease its application. Furthermore, the<br />

SP could rst block the lease of the previous application be<strong>for</strong>e leasing to the new smart<br />

card. Nevertheless, there are certain concerns in the contents backup mechanism that are<br />

related to the key that encrypts/decrypts the backup packages. The framework requires<br />

the user to input a secret value that could be a long PIN, password, or passphrase that<br />

can be exploited by an adversary. To avoid the use of weak user passwords it is recommended<br />

the backup servers should take adequate measures by requiring users to choose<br />

strong passwords. Furthermore, be<strong>for</strong>e a user can download authorisation tokens from<br />

the backup server there should be some oine authorisation (e.g. activation of restoration<br />

process on a backup server over the internet or telephone).<br />

The migration mechanism is similar to the backup mechanism, except <strong>for</strong> one detail. It does<br />

not require a backup server, so it avoids the need <strong>for</strong> user password-based cryptographic<br />

keys. We consider that the backup & restoration manager of a given smart card should<br />

support both the backup and migration mechanisms.<br />

9.3 Application Deletion<br />

In this section, we discuss the last stage in the lifecycle of an application: deletion of an<br />

application.<br />

9.3.1 Existing Framework<br />

In the ICOM, post-issuance application installation or deletion is rare. Nevertheless, application<br />

deletion is detailed in all of the major smart card plat<strong>for</strong>ms and operating systems.<br />

In Multos, the application deletion process is the same as application loading depicted in<br />

gure 5.2. The only dierences are that in the deletion process, there is no application<br />

load unit generator, and an application provider or a card issuer requests the Multos<br />

Certication Authority <strong>for</strong> the application deletion certicate instead of the application<br />

load certicate [97]. The on-card deletion process simply deletes the application data and<br />

code. As applications on a Multos card do not have interdependencies, the deletion process<br />

does not need to be concerned about the feature interaction problem (section 3.5.3). In<br />

the application sharing mechanism of the Multos cards (section 7.2.2), a client application<br />

may still make a delegation request. However, because it is just an APDU message, the<br />

delegation mechanism can return an error that should be handled by the client application.<br />

217

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!