Simulator Problem in User Centric Smart Card Ownership Model

Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes

Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

12 Citations (Scopus)

Abstract

The Issuer Centric Smart Card Ownership Model (ICOM) gives complete control of smart cards to their respective card issuers, enabling them to install, modify or delete applications remotely, in a secure manner. However, the User Centric Smart Card Ownership Model (UCOM) delegates the ownership of smart cards to their users, entitling them to install or delete any application according to their requirements. In the UCOM there might be no off-card relationship between a smart card and an application provider, referred to as a Service Provider, which is the cornerstone of the ICOM security framework. Therefore, this creates unique security issues like the simulator problem, in which a malicious user may simulate the smart card environment on a computing device and requests installation of an application. Following this, it might be possible to retrieve sensitive application data by reverse engineering. In this paper, we analyse the simulator problem, how it affects the UCOM and propose a possible solution.
Original languageEnglish
Title of host publicationIEEE/IFIP International Conference on Embedded and Ubiquitous Computing
Place of PublicationHongKong, China
PublisherIEEE Computer Society Press
DOIs
Publication statusPublished - 1 Dec 2010

Fingerprint

Dive into the research topics of 'Simulator Problem in User Centric Smart Card Ownership Model'. Together they form a unique fingerprint.

Cite this