Abstract. This paper reports on a method to handle the verification of various security properties of imperative source code embedded on smart cards. The idea is to combine two program verification approaches: the functional verification at the source code level and the verification of high level properties on a formal model built from the program and its specification. The method presented uses the Caduceus tool, built on top of the Why tool. Caduceus enables the verification of an annotated C program and provides a validation process that we used to generate a high level formal model of the C source code. This method is illustrated by an example extracted from the verification of a smart card embedded operating system
The use of smart cards to run software modules on demand has become a major business concern for ap...
Abstract. We describe the experience of modeling and formally verifying a software cache algorithm u...
The JavaCard transaction mechanism can ensure that a sequence of statements either is executed to co...
To be widely accepted, smart cards must contain completely trustworthy software. Because smart cards...
In our increasingly computer-oriented society, the computer programs we rely on tend to increase in ...
This paper describes the certification of smart-card applications in the framework of Common Criteri...
Formally verifying a product in an early phase of the design process has several advantages. First, ...
AbstractThis paper discusses a case study in formal verification and development of secure smart car...
International audienceFault attacks can target smart card programs to disrupt an execution and take ...
The security of much critical infrastructure depends in part on cryptographic software coded in C, a...
The goal of this work is the design of a language for the implementation of smart card applications,...
Cette thèse s’intéresse aux effets des attaques par fautes physiques sur le code d’un système embarq...
In the next years, smart cards are going to become the main personal identification document in many...
We present a formal model for security protocols of smart card applications using Abstract State Mac...
Despite the increased use of smartcards in many areas of everyday life the secure interoperability o...
The use of smart cards to run software modules on demand has become a major business concern for ap...
Abstract. We describe the experience of modeling and formally verifying a software cache algorithm u...
The JavaCard transaction mechanism can ensure that a sequence of statements either is executed to co...
To be widely accepted, smart cards must contain completely trustworthy software. Because smart cards...
In our increasingly computer-oriented society, the computer programs we rely on tend to increase in ...
This paper describes the certification of smart-card applications in the framework of Common Criteri...
Formally verifying a product in an early phase of the design process has several advantages. First, ...
AbstractThis paper discusses a case study in formal verification and development of secure smart car...
International audienceFault attacks can target smart card programs to disrupt an execution and take ...
The security of much critical infrastructure depends in part on cryptographic software coded in C, a...
The goal of this work is the design of a language for the implementation of smart card applications,...
Cette thèse s’intéresse aux effets des attaques par fautes physiques sur le code d’un système embarq...
In the next years, smart cards are going to become the main personal identification document in many...
We present a formal model for security protocols of smart card applications using Abstract State Mac...
Despite the increased use of smartcards in many areas of everyday life the secure interoperability o...
The use of smart cards to run software modules on demand has become a major business concern for ap...
Abstract. We describe the experience of modeling and formally verifying a software cache algorithm u...
The JavaCard transaction mechanism can ensure that a sequence of statements either is executed to co...