06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4.4 <strong>Security</strong> Assurance and Validation Mechanism<br />

4.4 <strong>Security</strong> Assurance and Validation Mechanism<br />

The UCOM requires a mechanism that supports a dynamic and remote security assurance<br />

and validation process which is based on the TEM coupled with a third party evaluation.<br />

The third party evaluation certicate provides a security assurance and TEM provides the<br />

validation that the assurance is correct at the time of request. However, in the UCOM<br />

environment, applications are not required to be evaluated by third parties, and so evaluations<br />

can be costly, and may discourage small and medium-scale organisations from opting<br />

<strong>for</strong> the UCTD-based architecture. To verify the security and reliability of an application,<br />

a smart card can employ on-card verication mechanisms like bytecode verication [128].<br />

In this thesis, we refer to the Common Criteria (CC) evaluators <strong>for</strong> third party evaluation<br />

as it is one of the most accepted and deployed evaluation mechanisms in the smart card<br />

industry.<br />

4.4.1 Common Criteria<br />

In late 1990s, the Common Criteria (CC) was released, and they were later adopted as<br />

a multi-part ISO/IEC standard (ISO/IEC 15408 [129]), that is internationally accepted<br />

under the Common Criteria Recognition Agreement (CCRA) [69].<br />

The CC scheme denes the methodology <strong>for</strong> expressing the security requirements, con<strong>for</strong>mance<br />

claims, evaluations process, and nally, certication of the product. The security<br />

requirements <strong>for</strong> a product at an abstract level are stipulated by Protection Proles (PPs).<br />

A <strong>Security</strong> Target (ST) details these security requirements and makes the con<strong>for</strong>mance<br />

claims <strong>for</strong> a product or its sub-component(s), generally referred to as Target of Evaluation<br />

(TOE).<br />

The Evaluation Assurance Levels (EALs) are predened assurance packages that have a set<br />

of security requirements. There are seven packages dened in the Common Methodology<br />

<strong>for</strong> In<strong>for</strong>mation Technology <strong>Security</strong> Evaluation (CEM) [130] that are referred as EAL<br />

1 to EAL 7 with level seven being the most comprehensive security evaluation. The CC<br />

proposes an evaluation methodology, which denes the procedures that an evaluator should<br />

follow when processing con<strong>for</strong>mance claims regarding a TOE under a particular ST, PP<br />

and desired EAL. This evaluation methodology is published in the CEM [130].<br />

In the literature, some reservations are expressed regarding the validity and the process ef-<br />

ciency of the CC [67, 86, 131]. However, the CC has taken a strong hold in the smart card<br />

industry, especially in high-security areas like banking and IDS/passports, as the security<br />

90

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!