Advertisement

Verifying Extended Criteria for the Interoperability of Security Devices

  • Maurizio Talamo
  • Franco Arcieri
  • Giuseppe Della Penna
  • Andrea Dimitri
  • Benedetto Intrigila
  • Daniele Magazzeni
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5332)

Abstract

In the next years, smart cards are going to become the main personal identification document in many nations. In particular, both Europe and United States are currently working to this aim. Therefore, tens of millions of smart cards, based on hardware devices provided by many different manufacturers, will be distributed all over the world, and used in particular to accomplish the security tasks of electronic authentication and electronic signature. In this context, the so called Common Criteria define the security requirements for digital signature devices. Unfortunately, these criteria do not address any interoperability issue between smart cards of different manufacturers, which usually implement digital signature process in still correct but slightly different ways.

To face the interoperability problem, we realized a complete testing environment whose core is the Crypto Probing System ©Nestor Lab, an abstract interface to a generic cryptographic smart card, embedding a standard model of the correct card behavior, which can be used to test the digital signature process behavior, also in the presence of alternate or disturbed command sequences, in conjunction with automatic verification techniques such as model checking. The framework allows to verify abstract behavior models against real smart cards, so it can be used to automatically verify the Common Criteria as well as the extended interoperability criteria above and many other low-level constraints. In particular, in this paper we show how we can verify that the card, in the presence of a sequence of (partially) modified commands, rejects them without any side effect, remaining usable, or accepts them, generating a correct final result.

Keywords

Model Check Smart Card Digital Signature Process Common Criterion Correct Behavior 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    CEN: TC224 WG15Google Scholar
  2. 2.
    D.M. S.O. n. 229 della G.U. 261 del 9/11/2007 Regole tecniche della Carta d’identita elettronica (Technical Rules for the Eletronic Identity Card) (November 8, 2007)Google Scholar
  3. 3.
    Common Criteria for Information Technology Security Evaluation (September 2006)Google Scholar
  4. 4.
    CEN WORKSHOP AGREEMENT: Cwa 14169 (March 2004)Google Scholar
  5. 5.
    Leroy, X.: Computer security from a programming language and static analysis perspective. In: Degano, P. (ed.) ESOP 2003. LNCS, vol. 2618, pp. 1–9. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  6. 6.
    Toll, D.C., Weber, S., Karger, P.A., Palmer, E.R., McIntosh, S.K.: Tooling in Support of Common Criteria Evaluation of a High Assurance Operating System. IBM Thomas J. Watson Research Center Report (2008)Google Scholar
  7. 7.
    Chapman, R.: Correctness by construction: a manifesto for high integrity software. In: SCS 2005: Proceedings of the 10th Australian workshop on Safety critical systems and software, pp. 43–46. Australian Computer Society, Inc. (2006)Google Scholar
  8. 8.
  9. 9.
    Michael, C., Radosevich, W.: Black box security testing tools. Cigital (2005)Google Scholar
  10. 10.
    Della Penna, G., Intrigila, B., Melatti, I., Tronci, E., Venturini Zilli, M.: Integrating ram and disk based verification within the Murϕ verifier. In: Geist, D., Tronci, E. (eds.) CHARME 2003. LNCS, vol. 2860, pp. 277–282. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  11. 11.
    Della Penna, G., Intrigila, B., Melatti, I., Minichino, M., Ciancamerla, E., Parisse, A., Tronci, E., Venturini Zilli, M.: Automatic verification of a turbogas control system with the Murϕ verifier. In: Maler, O., Pnueli, A. (eds.) HSCC 2003. LNCS, vol. 2623, pp. 141–155. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  12. 12.
    Melatti, I., Palmer, R., Sawaya, G., Yang, Y., Kirby, R.M., Gopalakrishnan, G.: Parallel and distributed model checking in eddy. In: Valmari, A. (ed.) SPIN 2006. LNCS, vol. 3925, pp. 108–125. Springer, Heidelberg (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Maurizio Talamo
    • 1
    • 3
  • Franco Arcieri
    • 1
  • Giuseppe Della Penna
    • 2
  • Andrea Dimitri
    • 1
  • Benedetto Intrigila
    • 3
  • Daniele Magazzeni
    • 2
  1. 1.Nestor LabUniversity of Roma “Tor Vergata”Italy
  2. 2.Department of Computer ScienceUniversity of L’AquilaItaly
  3. 3.Department of MathematicsUniversity of Roma “Tor Vergata”Italy

Personalised recommendations