The design of secure systems requires the use of security analysis techniques. Security objectives have to be considered during the early stages of system development and design; an executable model will give the designer the adventage of exploring the vulnerabilities early, and therefore enhancing the system security. In this work we create an executable model of a smart card system using SystemC with the Transaction Level Modelling (TLM) extensions. The model includes the security protocols and transactions. The model is used to compare a number of authentication mechanisms with different probabilities of failure. In addition, a number of probable attacks, including theft of a private key and denial of service were modelled to examine the...
Abstract:- Intelligent safety-critical systems, such as intelligent automotive systems or intelligen...
Abstract: As system-on-chip (SoC) becomes prevalent in the intelligent system applications, the reli...
International audience<p>Security flaws are open doors to attack embedded systems and must be carefu...
The design of secure systems requires the use of security analysis techniques. Security objectives h...
Smart cards are an example of advanced chip technology. They allow information transfer between the ...
Smart cards are examples of advanced chip technology. They allow information transfer between the ca...
Smart cards are examples of advanced chip technology. They allow information transfer between the ca...
Smart cards are embedded systems which are used in an increasing number of secure applications. As t...
AbstractDesigning and implementing security-critical systems correctly is very difficult. In practic...
Currently computer systems and software used by the average user offer less security due to rapid g...
There is a strong demand for techniques to aid development and modelling of security critical system...
We present a method of contactless smart card protocol modeling suitable for finding vulnerabilities ...
AbstractThe smart cards are increasingly used in several fields with critical data that require secu...
Despite the increased use of smartcards in many areas of everyday life the secure interoperability o...
In this report we present two case studies with Systems of Systems modelling. One model illustrates ...
Abstract:- Intelligent safety-critical systems, such as intelligent automotive systems or intelligen...
Abstract: As system-on-chip (SoC) becomes prevalent in the intelligent system applications, the reli...
International audience<p>Security flaws are open doors to attack embedded systems and must be carefu...
The design of secure systems requires the use of security analysis techniques. Security objectives h...
Smart cards are an example of advanced chip technology. They allow information transfer between the ...
Smart cards are examples of advanced chip technology. They allow information transfer between the ca...
Smart cards are examples of advanced chip technology. They allow information transfer between the ca...
Smart cards are embedded systems which are used in an increasing number of secure applications. As t...
AbstractDesigning and implementing security-critical systems correctly is very difficult. In practic...
Currently computer systems and software used by the average user offer less security due to rapid g...
There is a strong demand for techniques to aid development and modelling of security critical system...
We present a method of contactless smart card protocol modeling suitable for finding vulnerabilities ...
AbstractThe smart cards are increasingly used in several fields with critical data that require secu...
Despite the increased use of smartcards in many areas of everyday life the secure interoperability o...
In this report we present two case studies with Systems of Systems modelling. One model illustrates ...
Abstract:- Intelligent safety-critical systems, such as intelligent automotive systems or intelligen...
Abstract: As system-on-chip (SoC) becomes prevalent in the intelligent system applications, the reli...
International audience<p>Security flaws are open doors to attack embedded systems and must be carefu...