06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

3.5 <strong>Security</strong> and Operational Requirements of the UCOM<br />

SCR8. Feature Interaction Problem Avoidance: The smart card needs to have a<br />

mechanism that prevents any possible feature interaction problems. Feature interaction<br />

problems are caused by dependencies between the software and hardware.<br />

The mechanism will record any dependencies of an application be<strong>for</strong>e it is installed.<br />

There<strong>for</strong>e, when there is a change that aects the dependencies of the application,<br />

it can either be deleted or cease its execution.<br />

SCR9. Malicious Application/<strong>User</strong> Problem: The smart card should implement effective<br />

security and privacy measures to counter a malicious user or application. The<br />

smart card plat<strong>for</strong>m should be able to resist the introduction of malicious applications<br />

or hardware-based intrusions to breach security. To avoid application-level<br />

breaches, the card should have the capability to per<strong>for</strong>m application code verications<br />

on the card. In addition it should have a conservative execution environment<br />

(i.e. a defensive virtual machine [112]) that ceases execution of an application if there<br />

is a violation of the card's security.<br />

SCR10. Application Scanning Attack: Each application on a smart card acts as an<br />

identity of the card owner in some context, as discussed in the previous section.<br />

Each application on a smart card has unique Application Identier (AID) [24]. A<br />

malicious user can use the application identier to scan the applications installed<br />

on a particular card. It will not only violate the privacy requirement of the user,<br />

but may also enable the attacker to create/modify the attack. A malicious user may<br />

choose the weakest application in the smart card to initiate an attack. The smart<br />

card should have a security mechanism to avoid such an attack.<br />

3.5.4 Service Provider's Requirements<br />

Service providers use smart cards as secure tokens to oer their services, in a secure manner,<br />

to their customers. If this secure token is compromised, they have to bear both nancial<br />

and brand losses. There<strong>for</strong>e, from a business point of view, SPs have even more at stake<br />

than card issuers, both nancially and in relation to brand image, and they would be<br />

reluctant to adopt the UCOM, if they had doubts about its security. The requirements of<br />

SPs in the UCOM are listed below:<br />

SPR1. Transmission <strong>Security</strong>: SPs will lease their applications to a smart card through<br />

the internet or a third party intranet. It is essential that applications are not tampered<br />

with during the transmission.<br />

SPR2. Installation <strong>Security</strong>: After an application is downloaded to a smart card, it<br />

will be decrypted. During this process, no on-card or o-card entity should be able<br />

to gain access to the application code or data.<br />

74

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!