06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

BIBLIOGRAPHY<br />

pp. 1414.<br />

[186] R. N. Akram, K. Markantonakis, and K. Mayes, Firewall Mechanism in a <strong>User</strong><br />

<strong>Centric</strong> Smart Card Ownership <strong>Model</strong>, in Smart Card Research and Advanced Application,<br />

9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, D. Gollmann,<br />

J.-L. Lanet, and J. Iguchi-Cartigny, Eds., vol. 6035/2010. Passau, Germany:<br />

Springer, April 2010, pp. 118132.<br />

[187] M. Éluard, T. P. Jensen, and E. Denney, An Operational Semantics of the Java<br />

Card Firewall, in E-SMART '01: Proceedings of the International Conference on<br />

Research in Smart Cards. London, UK: Springer-Verlag, 2001, pp. 95110.<br />

[188] C. Bernardeschi and L. Martini, En<strong>for</strong>cement of Applet Boundaries in Java Card<br />

Systems, in IASTED Conf. on Software Engineering and Applications, 2004, pp.<br />

96101.<br />

[189] M. Huisman, D. Gurov, C. Sprenger, and G. Chugunov, Checking Absence of Illicit<br />

Applet Interactions: A Case Study, in Fundamental Approaches to Software Engineering,<br />

FASE 2004, ser. Lecture Notes in Computer Science, no. 2984. Springer,<br />

2004.<br />

[190] W. Mostowski and E. Poll, Malicious Code on Java Card Smartcards: Attacks<br />

and Countermeasures, in CARDIS '08: Proceedings of the 8th IFIP WG 8.8/11.2<br />

international conference on Smart Card Research and Advanced Applications. Berlin,<br />

Heidelberg: Springer-Verlag, 2008, pp. 116.<br />

[191] M. Éluard and T. Jensen, Secure Object Flow Analysis <strong>for</strong> Java Card, in<br />

CARDIS'02: Proceedings of the 5th conference on Smart Card Research and Advanced<br />

Application Conference. Berkeley, CA, USA: USENIX Association, 2002,<br />

pp. 1111.<br />

[192] P. Bieber, J. Cazin, A. E. Marouani, P. Girard, J. L. Lanet, V. Wiels, and G. Zanon,<br />

The PACAP Prototype: A Tool <strong>for</strong> Detecting Java Card Illegal Flow, in JavaCard<br />

'00: Revised Papers from the First International Workshop on Java on Smart Cards:<br />

Programming and <strong>Security</strong>. London, UK: Springer-Verlag, 2001, pp. 2537.<br />

[193] National Strategy <strong>for</strong> Trusted Identities in Cyberspace, Department of<br />

Homeland <strong>Security</strong>, USA, Draft Proposal, June 2010. Online Available:<br />

http://www.dhs.gov/xlibrary/assets/ns_tic.pdf<br />

[194] G. Barbu, H. Thiebeauld, and V. Guerin, Attacks on Java Card 3.0 Combining Fault<br />

and Logical Attacks, in Smart Card Research and Advanced Application, 9th IFIP<br />

WG 8.8/11.2 International Conference, CARDIS 2010, ser. LNCS, D. Gollmann,<br />

J.-L. Lanet, and J. Iguchi-Cartigny, Eds., vol. 6035/2010, 2010, pp. 148163.<br />

[195] J.-L. Lanet and J. Iguchi-Cartigny, Developing a Trojan applet in a Smart Card ,<br />

Journal in Computer Virology, vol. 6, no. 1, 2009.<br />

[196] R. Anderson and M. Kuhn, Low Cost Attacks on <strong>Tamper</strong> <strong>Resistant</strong> <strong>Devices</strong>, in <strong>Security</strong><br />

Protocols, B. Christianson, B. Crispo, M. Lomas, and M. Roe, Eds. Springer,<br />

1998, vol. 1361, pp. 125136.<br />

[197] P. C. Kocher, J. Jae, and B. Jun, Dierential Power Analysis, in CRYPTO '99:<br />

465

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!