Abstract
In the next years, smart cards are going to become the main personal identification document in many nations. In particular, both Europe and United States are currently working to this aim. Therefore, tens of millions of smart cards, based on hardware devices provided by many different manufacturers, will be distributed all over the world, and used in particular to accomplish the security tasks of electronic authentication and electronic signature. In this context, the so called Common Criteria define the security requirements for digital signature devices. Unfortunately, these criteria do not address any interoperability issue between smart cards of different manufacturers, which usually implement digital signature process in still correct but slightly different ways.
To face the interoperability problem, we realized a complete testing environment whose core is the Crypto Probing System ©Nestor Lab, an abstract interface to a generic cryptographic smart card, embedding a standard model of the correct card behavior, which can be used to test the digital signature process behavior, also in the presence of alternate or disturbed command sequences, in conjunction with automatic verification techniques such as model checking. The framework allows to verify abstract behavior models against real smart cards, so it can be used to automatically verify the Common Criteria as well as the extended interoperability criteria above and many other low-level constraints. In particular, in this paper we show how we can verify that the card, in the presence of a sequence of (partially) modified commands, rejects them without any side effect, remaining usable, or accepts them, generating a correct final result.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
CEN: TC224 WG15
D.M. S.O. n. 229 della G.U. 261 del 9/11/2007 Regole tecniche della Carta d’identita elettronica (Technical Rules for the Eletronic Identity Card) (November 8, 2007)
Common Criteria for Information Technology Security Evaluation (September 2006)
CEN WORKSHOP AGREEMENT: Cwa 14169 (March 2004)
Leroy, X.: Computer security from a programming language and static analysis perspective. In: Degano, P. (ed.) ESOP 2003. LNCS, vol. 2618, pp. 1–9. Springer, Heidelberg (2003)
Toll, D.C., Weber, S., Karger, P.A., Palmer, E.R., McIntosh, S.K.: Tooling in Support of Common Criteria Evaluation of a High Assurance Operating System. IBM Thomas J. Watson Research Center Report (2008)
Chapman, R.: Correctness by construction: a manifesto for high integrity software. In: SCS 2005: Proceedings of the 10th Australian workshop on Safety critical systems and software, pp. 43–46. Australian Computer Society, Inc. (2006)
CMurphi Web Page, http://www.di.univaq.it/gdellape/murphi/cmurphi.php
Michael, C., Radosevich, W.: Black box security testing tools. Cigital (2005)
Della Penna, G., Intrigila, B., Melatti, I., Tronci, E., Venturini Zilli, M.: Integrating ram and disk based verification within the Murϕ verifier. In: Geist, D., Tronci, E. (eds.) CHARME 2003. LNCS, vol. 2860, pp. 277–282. Springer, Heidelberg (2003)
Della Penna, G., Intrigila, B., Melatti, I., Minichino, M., Ciancamerla, E., Parisse, A., Tronci, E., Venturini Zilli, M.: Automatic verification of a turbogas control system with the Murϕ verifier. In: Maler, O., Pnueli, A. (eds.) HSCC 2003. LNCS, vol. 2623, pp. 141–155. Springer, Heidelberg (2003)
Melatti, I., Palmer, R., Sawaya, G., Yang, Y., Kirby, R.M., Gopalakrishnan, G.: Parallel and distributed model checking in eddy. In: Valmari, A. (ed.) SPIN 2006. LNCS, vol. 3925, pp. 108–125. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Talamo, M., Arcieri, F., Della Penna, G., Dimitri, A., Intrigila, B., Magazzeni, D. (2008). Verifying Extended Criteria for the Interoperability of Security Devices. In: Meersman, R., Tari, Z. (eds) On the Move to Meaningful Internet Systems: OTM 2008. OTM 2008. Lecture Notes in Computer Science, vol 5332. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88873-4_14
Download citation
DOI: https://doi.org/10.1007/978-3-540-88873-4_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88872-7
Online ISBN: 978-3-540-88873-4
eBook Packages: Computer ScienceComputer Science (R0)