06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Appendix C<br />

Practical Implementation Source<br />

Code<br />

Contents<br />

C.1 Oine Attestation Mechanism . . . . . . . . . . . . . . . . . . . 253<br />

C.2 Online Attestation Mechanism . . . . . . . . . . . . . . . . . . . 262<br />

C.3 Attestation Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . 272<br />

C.4 Secure and Trusted Channel Protocol Service Provider . . 290<br />

C.5 Secure and Trusted Channel Protocol Smart Card . . . . . 313<br />

C.6 Application Acquisition and Contractual Agreement Protocol 333<br />

C.7 Application Binding Protocol - Local . . . . . . . . . . . . . . . 364<br />

C.8 Application Binding Protocol - Distributed . . . . . . . . . . . . 377<br />

C.9 Plat<strong>for</strong>m Binding Protocol . . . . . . . . . . . . . . . . . . . . . . 404<br />

C.10 Abstract Virtual Machine . . . . . . . . . . . . . . . . . . . . . . 430<br />

C.11 Implementation Helper Classes . . . . . . . . . . . . . . . . . . . 433<br />

In this appendix, we detail the test implementation of the proposed protocols and frameworks<br />

discussed in this thesis.<br />

252

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!