Abstract: This paper is about generating security tests from the Common Criteria expression of a security policy, in addition to func-tional tests previously generated by a model-based testing approach. The method that we present re-uses the functional model and the con-cretization layer developed for the functional testing, and relies on an additional security policy model. We discuss how to produce the security policy model from a Common Criteria security target. We propose to compute the tests by using some test purposes as guides for the tests to be extracted from the models. We see a test purpose as the combination of a security property and a test need issued from the know-how of a security engineer. We propose a language based on reg...
This paper describes the certification of smart-card applications in the framework of Common Criteri...
Testing denotes a set of activities that aim at discovering discrepancies between actual and intende...
This paper presents a formal security policy model for Smart-Cards with digital signature applicatio...
International audienceThis paper is about generating security tests from the Common Criteria express...
International audienceThis paper is about generating security tests from the Common Criteria express...
International audienceModel-Based Testing (MBT) is a widely used methodology for generating tests ai...
peer reviewedModel-Based Testing (MBT) is a widely used methodology for generating tests aiming to e...
In the next years, smart cards are going to become the main personal identification document in many...
International audienceWe propose in this paper a formal framework based on the B method, that suppor...
International audienceWe propose a formal framework based on the B method, that supports the develop...
International audienceSmart cards are tamper resistant devices but vulnerabilities are sometimes dis...
Security functional testing is a costly activity typically performed by security evaluation laborato...
International audienceWe present a model-based approach to testing access control requirements. By u...
We present a formal model for security protocols of smart card applications using Abstract State Mac...
We present a method for proving representation correspondences in the Common Criteria (CC) certifica...
This paper describes the certification of smart-card applications in the framework of Common Criteri...
Testing denotes a set of activities that aim at discovering discrepancies between actual and intende...
This paper presents a formal security policy model for Smart-Cards with digital signature applicatio...
International audienceThis paper is about generating security tests from the Common Criteria express...
International audienceThis paper is about generating security tests from the Common Criteria express...
International audienceModel-Based Testing (MBT) is a widely used methodology for generating tests ai...
peer reviewedModel-Based Testing (MBT) is a widely used methodology for generating tests aiming to e...
In the next years, smart cards are going to become the main personal identification document in many...
International audienceWe propose in this paper a formal framework based on the B method, that suppor...
International audienceWe propose a formal framework based on the B method, that supports the develop...
International audienceSmart cards are tamper resistant devices but vulnerabilities are sometimes dis...
Security functional testing is a costly activity typically performed by security evaluation laborato...
International audienceWe present a model-based approach to testing access control requirements. By u...
We present a formal model for security protocols of smart card applications using Abstract State Mac...
We present a method for proving representation correspondences in the Common Criteria (CC) certifica...
This paper describes the certification of smart-card applications in the framework of Common Criteri...
Testing denotes a set of activities that aim at discovering discrepancies between actual and intende...
This paper presents a formal security policy model for Smart-Cards with digital signature applicatio...