Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on (2010)
Hong Kong, China
Dec. 11, 2010 to Dec. 13, 2010
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/EUC.2010.108
The Issuer Centric Smart Card Ownership Model (ICOM) gives complete control of smart cards to their respective card issuers, enabling them to install, modify or delete applications remotely, in a secure manner. However, the User Centric Smart Card Ownership Model (UCOM) delegates the ownership of smart cards to their users, entitling them to install or delete any application according to their requirements. In the UCOM there might be no off-card relationship between a smart card and an application provider, referred to as a Service Provider, which is the cornerstone of the ICOM security framework. Therefore, this creates unique security issues like the simulator problem, in which a malicious user may simulate the smart card environment on a computing device and requests installation of an application. Following this, it might be possible to retrieve sensitive application data by reverse engineering. In this paper, we analyse the simulator problem, how it affects the UCOM and propose a possible solution.
Smart Card, Ownership Model, User's Ownership, Trusted Platform Module
K. Mayes, R. N. Akram and K. Markantonakis, "Simulator Problem in User Centric Smart Card Ownership Model," 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC 2010)(EUC), Hong Kong, 2010, pp. 679-686.