We present a method of contactless smart card protocol modeling suitable for finding vulnerabilities using model checking. Smart cards are used in applications that require high level of security, such as payment applications, therefore it should be ensured that the implementation does not contain any vulnerabilities. High level application specifications may lead to different implementations. Protocol that is proved to be secure on high level and that uses secure smart card can be implemented in more than one way, some of these implementations are secure, some of them introduce vulnerabilities to the application. The goal of this paper is to provide a method that can be used to create a model of arbitrary smart card, with focus on contactles...
Abstract. Smart card Web server provides a modern interface between smart cards and the external wor...
International audienceWe propose a formal framework based on the B method, that supports the develop...
The use of smart cards to run software modules on demand has become a major business concern for ap...
We present a method of contactless smart card protocol modeling suitable for finding vulnerabilities ...
We present a formal model for security protocols of smart card applications using Abstract State Mac...
An existing approach based on induction and theorem proving is tailored to the verification of secur...
In the next years, smart cards are going to become the main personal identification document in many...
Security protocols based on smart cards lack formal analysis. The theoretic analysis by Bellare &...
Despite the increased use of smartcards in many areas of everyday life the secure interoperability o...
Smart cards are an example of advanced chip technology. They allow information transfer between the ...
Smart cards are examples of advanced chip technology. They allow information transfer between the ca...
This dissertation presents the findings of a generic model aimed at providing secure communication w...
Part 1: Smart Cards System SecurityInternational audienceSmart card Web server provides a modern int...
Formally verifying a product in an early phase of the design process has several advantages. First, ...
This paper presents a formal security policy model for Smart-Cards with digital signature applicatio...
Abstract. Smart card Web server provides a modern interface between smart cards and the external wor...
International audienceWe propose a formal framework based on the B method, that supports the develop...
The use of smart cards to run software modules on demand has become a major business concern for ap...
We present a method of contactless smart card protocol modeling suitable for finding vulnerabilities ...
We present a formal model for security protocols of smart card applications using Abstract State Mac...
An existing approach based on induction and theorem proving is tailored to the verification of secur...
In the next years, smart cards are going to become the main personal identification document in many...
Security protocols based on smart cards lack formal analysis. The theoretic analysis by Bellare &...
Despite the increased use of smartcards in many areas of everyday life the secure interoperability o...
Smart cards are an example of advanced chip technology. They allow information transfer between the ...
Smart cards are examples of advanced chip technology. They allow information transfer between the ca...
This dissertation presents the findings of a generic model aimed at providing secure communication w...
Part 1: Smart Cards System SecurityInternational audienceSmart card Web server provides a modern int...
Formally verifying a product in an early phase of the design process has several advantages. First, ...
This paper presents a formal security policy model for Smart-Cards with digital signature applicatio...
Abstract. Smart card Web server provides a modern interface between smart cards and the external wor...
International audienceWe propose a formal framework based on the B method, that supports the develop...
The use of smart cards to run software modules on demand has become a major business concern for ap...