We present a method of contactless smart card protocol modeling suitable for finding vulnerabilities using model checking. Smart cards are used in applications that require high level of security, such as payment applications, therefore it should be ensured that the implementation does not contain any vulnerabilities. High level application specifications may lead to different implementations. Protocol that is proved to be secure on high level and that uses secure smart card can be implemented in more than one way, some of these implementations are secure, some of them introduce vulnerabilities to the application. The goal of this paper is to provide a method that can be used to create a model of arbitrary smart card, with focus on contactles...
International audienceSmart cards are tamper resistant devices but vulnerabilities are sometimes dis...
Security protocols are critical components for the construction of secure Internet services but thei...
Formal support in the design and implementation of security-aware applications increases the assuran...
We present a method of contactless smart card protocol modeling suitable for finding vulnerabilities ...
We present a formal model for security protocols of smart card applications using Abstract State Mac...
Smart cards are an example of advanced chip technology. They allow information transfer between the ...
An existing approach based on induction and theorem proving is tailored to the verification of secur...
Currently computer systems and software used by the average user offer less security due to rapid g...
Despite the increased use of smartcards in many areas of everyday life the secure interoperability o...
In the next years, smart cards are going to become the main personal identification document in many...
Smart cards are examples of advanced chip technology. They allow information transfer between the ca...
Security protocols based on smart cards lack formal analysis. The theoretic analysis by Bellare &...
We study the security requirements for remote authentication with password protected smart card. In ...
This dissertation presents the findings of a generic model aimed at providing secure communication w...
Tato práce analyzuje hrozby pro protokoly využívající bezkontaktní čipové karty a představuje metodu...
International audienceSmart cards are tamper resistant devices but vulnerabilities are sometimes dis...
Security protocols are critical components for the construction of secure Internet services but thei...
Formal support in the design and implementation of security-aware applications increases the assuran...
We present a method of contactless smart card protocol modeling suitable for finding vulnerabilities ...
We present a formal model for security protocols of smart card applications using Abstract State Mac...
Smart cards are an example of advanced chip technology. They allow information transfer between the ...
An existing approach based on induction and theorem proving is tailored to the verification of secur...
Currently computer systems and software used by the average user offer less security due to rapid g...
Despite the increased use of smartcards in many areas of everyday life the secure interoperability o...
In the next years, smart cards are going to become the main personal identification document in many...
Smart cards are examples of advanced chip technology. They allow information transfer between the ca...
Security protocols based on smart cards lack formal analysis. The theoretic analysis by Bellare &...
We study the security requirements for remote authentication with password protected smart card. In ...
This dissertation presents the findings of a generic model aimed at providing secure communication w...
Tato práce analyzuje hrozby pro protokoly využívající bezkontaktní čipové karty a představuje metodu...
International audienceSmart cards are tamper resistant devices but vulnerabilities are sometimes dis...
Security protocols are critical components for the construction of secure Internet services but thei...
Formal support in the design and implementation of security-aware applications increases the assuran...