The B-book: assigning programs to meanings
The B-book: assigning programs to meanings
Introducing Dynamic Constraints in B
B '98 Proceedings of the Second International B Conference on Recent Advances in the Development and Use of the B Method
Transacted Memory for Smart Cards
FME '01 Proceedings of the International Symposium of Formal Methods Europe on Formal Methods for Increasing Software Productivity
Safety and Security Analysis of Object-Oriented Models
SAFECOMP '02 Proceedings of the 21st International Conference on Computer Safety, Reliability and Security
Extending B with control flow breaks
ZB'03 Proceedings of the 3rd international conference on Formal specification and development in Z and B
Formalisation and verification of the globalplatform card specification using the b method
CASSIS'05 Proceedings of the Second international conference on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices
Hi-index | 0.00 |
This document describes an industrial application of the B method in smart card applications. In smart card memory, data modification may be interrupted due to a card withdrawal or a power loss, the EEPROM memory may result in an unstable state and the values subsequently read, may be erroneous. The transaction mechanism provides a secure means for modifying data located in the EEPROM. As the security in smart card application is paramount, the use of the B formal method brings high confidence and provides mathematical proofs that the design of the transaction mechanism fulfills the security requirements.