Advertisement

A Safe Update Mechanism for Smart Cards

  • Kristian BeilkeEmail author
  • Volker Roth
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9036)

Abstract

With the advent of the integration of smart card chips into national identity documents, the business model of replacing compromised smart cards becomes uneconomical. We propose a mechanism to safely apply updates to embedded systems, particularly high value smart cards, that are costly to replace. We identify the requirements for such a mechanism and describe how it can be implemented. Our mechanism achieves its properties at the expense of using moderately more non-volatile memory to store program code than contemporary smart cards. We have developed a Common Criteria protection profile package to abstractly describe such a mechanism and summarize it in this paper. The mechanism and the abstract description can be a starting point for a practical realization in consumer products.

Keywords

Smart Card Safety Property Security Objective Attack Vector Memory Management Unit 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    STMicroelectronics ST33F1M Smartcard MCU, http://www.st.com/internet/mcu/product/215291.jsp
  2. 2.
    Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and General Model; CCMB-2012-09-001, Version 3.1, Revision 4 (September 2012)Google Scholar
  3. 3.
    Abrahamsson, D.: Security Enhanced Firmware Update Procedures in Embedded Systems. Master’s thesis, Linköping University, Department of Computer and Information Science (2008)Google Scholar
  4. 4.
    Consortium, T.M.: The MULTOS Specification, http://www.multos.com
  5. 5.
  6. 6.
    Eurosmart: Protection Profile Security IC Platform Protection Profile developed by Atmel, Infineon Technologies AG, NXP Semiconductors, Renesas Technology Europe Ltd., STMicrocontrollers, Registered and Certified by Bundesamt für Sicherheit in der Informationstechnik (BSI) under Reference BSI-PP-0035, Version 1.0, 15.06 (June 2007), https://www.bsi.bund.de/SharedDocs/Zertifikate/PP/aktuell/PP_0035.html
  7. 7.
    Eurosmart: Security Integrated Circuit Platform Protection Profile with Augmentation Packages developed by Inside Secure, Infineon Technologies AG, NXP Semiconductors, STMicroelectronics, Registered and Certified by Bundesamt für Sicherheit in der Informationstechnik (BSI) under Reference BSI-CC-PP-0084-2014, Version 1.0, 19.02 (February 2014), https://www.bsi.bund.de/SharedDocs/Zertifikate/PP/aktuell/PP_0084.html
  8. 8.
    Giuffrida, C., Kuijsten, A., Tanenbaum, A.S.: Safe and automatic live update for operating systems. In: Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2013, pp. 279–292. ACM, New York (2013), http://doi.acm.org/10.1145/2451116.2451147 CrossRefGoogle Scholar
  9. 9.
    GlobalPlatform, I.: GlobalPlatform, http://www.globalplatform.org/
  10. 10.
    Lobdell, M.: Robust Over-the-Air Firmware Updates Using Program Flash Memory Swap on Kinetis Microcontrollers, http://cache.freescale.com/files/microcontrollers/doc/app_note/AN4533.pdf
  11. 11.
    Margraf, M.: The new german id card. In: Pohlmann, N., Reimer, H., Schneider, W. (eds.) ISSE 2010: Securing Electronic Business Processes (2011)Google Scholar
  12. 12.
    Noll, M.: System for a primary bios rom recovery in a dual bios rom computer system. US Patent 5,793,943 (August 11, 1998), http://www.google.com/patents/US5793943
  13. 13.
    Noubissi, A.C., Iguchi-Cartigny, J., Lanet, J.L.: Hot updates for java based smart cards. In: 22nd International Conference on Data Engineering Workshops, pp. 168–173 (2011)Google Scholar
  14. 14.
    Rankl, W., Effing, W.: Smart Card Handbook, 4th edn. Wiley Publishing (2010)Google Scholar
  15. 15.
    Skorobogatov, S., Woods, C. In: the blink of an eye: There goes your aes key. Cryptology ePrint Archive, Report 2012/296 (2012), http://eprint.iacr.org/2012/296
  16. 16.
    Smith, S., Weingart, S.: Building a high-performance, programmable secure coprocessor. Comput. Netw. 31, 831–860 (1999), http://domino.research.ibm.com/comm/research_projects.nsf/pages/ssd_scop.pubs.html CrossRefGoogle Scholar
  17. 17.
    Torrance, R., James, D.: The state-of-the-art in IC reverse engineering. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 363–381. Springer, Heidelberg (2009)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2015

Authors and Affiliations

  1. 1.Freie Universität BerlinBerlinGermany

Personalised recommendations