International audienceThe Java Card transaction mechanism allows to protect sensitive operations on smart cards against problems due to card tears or power losses. Statements within a transaction are viewed as a single atomic operation so that either they are all performed or none of them is. Krakatoa is a tool for static verification of Java programs annotated in JML (Java Modeling Language), a behavioral specification language tailored to Java and based on first order predicate logic. In a first step, we show how we modeled the transactions within Krakatoa, by generating on-the-fly (i.e. on each applet) specifications of the API methods for transactions. In a second step, we consider security problems that can be caused by a card tear. We...
We present how common Java Card security properties can be formalised in Dynamic Logic and verified,...
In this paper we extend a program logic for verifying Java Card applications by introducing a "throu...
Smart cards are used in security critical applications where money or private data is involved. Exam...
International audienceThe Java Card transaction mechanism allows to protect sensitive operations on ...
International audienceThe Java Card transaction mechanism allows to protect sensitive operations on ...
International audienceThe Java Card transaction mechanism allows to protect sensitive operations on ...
International audienceThe Java Card transaction mechanism allows to protect sensitive operations on ...
COSTA, Umberto Souza da; MOREIRA, Anamaria Martins; MUSICANTE, Martin A. Specification and Runtime V...
This thesis is concerned with formal development of Java Card applets. Java Card is a technology tha...
COSTA, Umberto Souza; MOREIRA, Anamaria Martins; MUSICANTE, Matin A.; SOUZA NETO, Plácido A. JCML: A...
AbstractJava Card is a version of Java developed to run on devices with severe storage and processin...
The JavaCard transaction mechanism can ensure that a sequence of statements either is executed to co...
This thesis is concerned with different aspects of Java Card application development and use of form...
AbstractJava Card is a version of Java developed to run on devices with severe storage and processin...
We present how common Java Card security properties can be formalised in Dynamic Logic and verified,...
We present how common Java Card security properties can be formalised in Dynamic Logic and verified,...
In this paper we extend a program logic for verifying Java Card applications by introducing a "throu...
Smart cards are used in security critical applications where money or private data is involved. Exam...
International audienceThe Java Card transaction mechanism allows to protect sensitive operations on ...
International audienceThe Java Card transaction mechanism allows to protect sensitive operations on ...
International audienceThe Java Card transaction mechanism allows to protect sensitive operations on ...
International audienceThe Java Card transaction mechanism allows to protect sensitive operations on ...
COSTA, Umberto Souza da; MOREIRA, Anamaria Martins; MUSICANTE, Martin A. Specification and Runtime V...
This thesis is concerned with formal development of Java Card applets. Java Card is a technology tha...
COSTA, Umberto Souza; MOREIRA, Anamaria Martins; MUSICANTE, Matin A.; SOUZA NETO, Plácido A. JCML: A...
AbstractJava Card is a version of Java developed to run on devices with severe storage and processin...
The JavaCard transaction mechanism can ensure that a sequence of statements either is executed to co...
This thesis is concerned with different aspects of Java Card application development and use of form...
AbstractJava Card is a version of Java developed to run on devices with severe storage and processin...
We present how common Java Card security properties can be formalised in Dynamic Logic and verified,...
We present how common Java Card security properties can be formalised in Dynamic Logic and verified,...
In this paper we extend a program logic for verifying Java Card applications by introducing a "throu...
Smart cards are used in security critical applications where money or private data is involved. Exam...