Secure object flow analysis for java card

  • Authors:
  • Marc Éluard;Thomas Jensen

  • Affiliations:
  • IRISA, Rennes, France;IRISA, Rennes, France

  • Venue:
  • CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

The access control exercised by the Java Card firewall can be bypassed by the use of shareable objects. To help detecting unwanted access to objects, we propose a static analysis that calculates a safe approximation of the possible flow of objects between Java Card applets. The analysis deals with a subset of the Java Card byte-code focusing on aspects of the Java Card firewall, method invocation, field access, variable access, shareable objects and contexts. The technical vehicle for achieving this task is a new kind of constraints: quantified conditional constraints, that permits us to model precisely the effects of the Java Card firewall by only producing a constraint if the corresponding operation is authorized by the firewall.