Breaking up is hard to do: modeling security threats for smart cards

  • Authors:
  • Bruce Schneier;Adam Shostack

  • Affiliations:
  • Counterpane systems;Netect, Inc.

  • Venue:
  • WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
  • Year:
  • 1999

Quantified Score

Hi-index 0.00

Visualization

Abstract

Smart card systems differ from conventional computer systems in that different aspects of the system are not under a single trust boundary. The processor, I/O, data, programs, and network may be controlled by different, and hostile, parties. We discuss the security ramifications of these "splits" in trust, showing that they are fundamental to a proper understanding of the security of systems that include smart cards.