Academia.eduAcademia.edu

Outline

High Performance Java Card Operating System

2014, 2014 Eighth International Conference on Software Security and Reliability

https://doi.org/10.1109/SERE.2014.16

Abstract

Due to the fast evolving of trusted computing environments and internet-of-things an eager need has been established for open platforms which support interchangeable technologies to co-exist without threatening system's security. Certainly, future embedded applications will need high performance operating systems to support the intensivecomputing algorithms required for satisfying acceptable response and secure the application inside the vulnerable open environment; hence, new inevitable requirements for embedded operating systems have arisen including hard real-time response, support for native applications, system openness and system scalability. This paper introduces a new design for secure and open smart card operating system, called ESCOS (Egypt Smart Card Operating System), based on the prevalent Java Card technology. The new design provides competitive characteristics in the main three factors of judging smart card platforms; namely, system security, supported technology and system response. In addition, ESCOS is designed to have high degree of modularity and re-configurability to meet fastchanging business needs and diverse hardware platforms.

References (32)

  1. Jos´e Rafael, Trigueiro de Carvalho, "Comparative analysis of authentication schemes on a Java Card smart card", Master Thesis, Technical University of Lisbon, 2011.
  2. Paul A. Karger, Suzanne K. McIntosh, Elaine R. Palmer, David C. Toll, and Samuel M. Weber, "Lessons learned building the Caernarvon high- assurance smart card operating system", IEEE Security and Privacy Magazine, 2010.
  3. Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny, "Interprocess communication in Java and MULTOS", 9th Volume, IFIP WG 8.8/11.2 International Conference, Springer, 2010.
  4. Wolfgang Rankl and Wolfgang Effing, "Smart card handbook", 4th Edition, John Wiley & Sons, 2010.
  5. Paul A. Karger, David C. Toll1, Elaine R. Palmer, Suzanne K. McIntosh, Samuel Weber, and Jonathan W. Edwards, "Implementing a high-assurance smart card OS", Financial Cryptography and Data Security, Lecture Notes in Computer Science Volume 6052, Springer, January 2010.
  6. Damien Sauveron, "Multiapplication smart card: Towards an open smart card", Elsevier, Information security technical report 14, 2009.
  7. "SmartMX2 family P60x040_052_080 VC", Objective Data Sheet, Rev. 1.1, NXP Semiconductors, 2012.
  8. D.C. Toll, P.A. Karger, E.R. Palmer, S.K. McIntosh, S. Weber, "The Caernarvon secure embedded operating system", Operating Systems Review 42, P. 32-39, 2008.
  9. P.A. Karger, D.C. Toll, S.K. McIntosh, "Processor requirements for a high security smart card operating system" 8th e-Smart Conference, Eurosmart, IBM Research RC 24219 (W0703-091), 2007.
  10. Kenneth R. Wilcox, "Multi-application smart cards: Card operating systems and application security", 21st Computer Science Seminar, 2003.
  11. Oracle, "Java authorized licensees of Java Card technology," 2014. http://www.oracle.com/technetwork/java/javame/javacard/licensees/in dex.html (accessed April 5, 2014).
  12. "Common Criteria for information technology security evaluation", Version 3.1, Common Criteria, 2012.
  13. "Java card runtime specifications /Virtual machine specifications /APIs reference", Version 3.0, Oracle, 2011.
  14. "GlobalPlatform card specification", Version 2.2.1, GlobalPlatform, 2011.
  15. "ISO/IEC 10373-6: Proximity cards", International Standards Organization, 2011.
  16. "JCOP 2.4.1 product evaluation", NXP Semiconductors, 2010.
  17. "Secure channel protocol 03 -Card specification v.2.2 -Amendment D", Version 1.1, GlobalPlatform, 2009.
  18. "STARCOS S 1.2 reference manual", G&D, 2002.
  19. Berlach, R., Lackner, M., Steger, C., Loinig, J., & Haselsteiner, E. (2014, January). Memory-efficient on-card byte code verification for Java cards. In Proceedings of the First Workshop on Cryptography and Security in Computing Systems (pp. 37-40). ACM.
  20. "ISO/IEC 14443", International Standards Organization, 2001. [22] "P5Cx012/02x/40/73/80/144 family Secure dual interface and contact PKI smart card controller", Short data sheet, NXP Semiconductors, August 2011.
  21. "NXP J3A080 and J2A080 Secure Smart Card Controller, Rev. 3, Security Target Lite", Evaluation documentation, NXP Semiconductors, December 2010.
  22. "JCOP21 v2.3.1 on secure PKI smart card controller, Rev. 2", Short data sheet, NXP Semiconductors, August 2007.
  23. R. Asgari and R. Ebrahimi Atani, "Secure file management system for Java cards", International Journal in Foundations of Computer Science & Technology, vol. 3, no. 5, pp. 1-11, Sep. 2013.
  24. Yu, Xiaoxue, and Dawei Zhang, "Optimization of transaction mechanism on Java card", In Software Engineering, Business Continuity, and Education, pp. 190-199. Springer Berlin Heidelberg, 2011.
  25. Gadyatskaya, Olga, Fabio Massacci, Federica Paci, and Sergey Stankevich, "Java card architecture for autonomous yet secure evolution of smart cards applications", In Information Security Technology for Applications, pp. 187-192. Springer Berlin Heidelberg, 2012.
  26. Gadyatskaya, Olga, and Fabio Massacci. "Controlling application interactions on the novel smart cards with Security-by-Contract", In Formal Methods for Components and Objects, pp. 197-215. Springer Berlin Heidelberg, 2013.
  27. Dragoni, Nicola, Eduardo Lostal, Davide Papini, and Javier Fabra, "How to secure off-card matching in Security-by-Contract for open multi-application smart cards", In Foundations and Practice of Security: 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers, vol. 6888, p. 32. Springer, 2012.
  28. Beilke, Kristian, and Volker Roth. "FlexCOS: an open smartcard platform for research and education", In Network and System Security, pp. 277-290. Springer Berlin Heidelberg, 2012.
  29. Ege, BarÕú, Elif Bilge Kavun, and Tolga YalçÕn. "Memory encryption for smart cards", In Smart Card Research and Advanced Applications, pp. 199-216. Springer Berlin Heidelberg, 2011.
  30. Martínez, V. Gayoso, L. Hernández Encinas, and C. Sánchez Ávila. "Java card implementation of the Elliptic Curve integrated encryption scheme using prime and binary finite fields", In Computational Intelligence in Security for Information Systems, pp. 160-167. Springer Berlin Heidelberg, 2011.
  31. He, Junwei, Liji Wu, and Xiangmin Zhang. "Design and implementation of a low Power Java Coprocessor for dual-interface IC Bank Card", In ASIC (ASICON), 2011 IEEE 9th International Conference on, pp. 965-969. IEEE, 2011.
  32. Peng, Zhang, and Jia Jian Fang, "Comparing and implementation of public key cryptography algorithms on smart card", In Computer Application and System Modeling (ICCASM), 2010 International Conference on, vol. 12, pp. V12-508. IEEE, 2010.