Applications on multi-application smart cards contain sensitive data and can exchange information. Thus a major concern is that these applications should not exchange data unless permitted by their respective policy. As modern smart cards allow post-issuance installation and removal of applications, traditional approaches for information flow analysis are not suitable. We suggest the Security-by-Contract approach for loading time application certification on the card, that will enable the stakeholders with the means to ensure the compliance of every update of the card with their security policy. We describe an extension of the card security architecture to deal with verification for different types of updates and present a Java Card prototype implementation of the Policy Checker with performance measurements.
|Title of host publication||2011 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY)|
|Publication status||Published - 2011|
|Event||IEEE International Symposium on Policies for Distributed Systems and Networks - Pisa, Italy|
Duration: 6 Jun 2011 → 8 Jun 2011
|Conference||IEEE International Symposium on Policies for Distributed Systems and Networks|
|Period||06/06/2011 → 08/06/2011|