06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

10.2 Recommendations <strong>for</strong> Future Work<br />

10.2 Recommendations <strong>for</strong> Future Work<br />

Our intention in this work was to analyse the feasibility of giving the ownership of a<br />

security- and reliability-critical device like a smart card to its user. We aimed to explore<br />

the possibilities that it would bring, and new application scenarios that might open up<br />

<strong>for</strong> the smart card-based services deployment. We have achieved our goals by providing a<br />

pathway <strong>for</strong> UCTDs and user centric smart cards, which not only provides security and<br />

reliability assurance to SPs but also give users freedom of choice. However, we consider<br />

that there is a long journey ahead <strong>for</strong> the user centric smart card proposal and there are<br />

many suggestions <strong>for</strong> possible improvements and directions <strong>for</strong> future research.<br />

There can be possible improvements in the hardware protection and remote attestation<br />

mechanism <strong>for</strong> the UCOM framework. An attestation mechanism that not only provides<br />

the assurance that the current state of the smart card is secure as stated by the appropriate<br />

evaluation authority, but also the uses hardware that will simplify the remote assurance<br />

mechanism. Furthermore, we need to provide security and reliability characterisation,<br />

classication, and <strong>for</strong>malisation of smart card / application services. We might employ<br />

mechanisms similar to those implemented in service-oriented computing architecture, taking<br />

smart cards and applications as two services that need to ascertain whether they can<br />

support each other's requirements. This work may lead to devising a language (semantics)<br />

to describe the above mentioned features as is done in Web Service Description Language<br />

(WSDL). Such a language can be used to create third party evaluation certicates, which<br />

in our proposal is the CC authority.<br />

An application tagging mechanism tags segments of an application with security and/or<br />

reliability levels, which instruct the runtime environment to apply adequate checks during<br />

the execution of the application. To support the application tagging mechanism in the<br />

UCOM, we need to have an on-card mechanism that can verify the security and reliability<br />

tags. There<strong>for</strong>e, an adversary cannot take advantage of such a framework to subvert<br />

a smart card's runtime protection. We refer to on-card analysis as on-card application<br />

behavioural analysis, which is similar to bytecode analysis but is focused on the nature of<br />

an application segment and its associated tag.<br />

One of the major future research directions is the smart card runtime environment, and<br />

its security and reliability in the presence of malicious applications, fault, and combined<br />

attacks. As discussed above, we need to look into the design of the virtual machine and<br />

build the protection from there, rather than implementing them in a piecemeal manner.<br />

This requires the study of existing virtual machines and language architectures, to nd<br />

out a balance between per<strong>for</strong>mance, and runtime-protection. This work may reduce the<br />

number of opcodes assigned in the Java virtual machine, and/or redening the execution<br />

structure.<br />

229

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!