Abstract
With the advent of the integration of smart card chips into national identity documents, the business model of replacing compromised smart cards becomes uneconomical. We propose a mechanism to safely apply updates to embedded systems, particularly high value smart cards, that are costly to replace. We identify the requirements for such a mechanism and describe how it can be implemented. Our mechanism achieves its properties at the expense of using moderately more non-volatile memory to store program code than contemporary smart cards. We have developed a Common Criteria protection profile package to abstractly describe such a mechanism and summarize it in this paper. The mechanism and the abstract description can be a starting point for a practical realization in consumer products.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
STMicroelectronics ST33F1M Smartcard MCU, http://www.st.com/internet/mcu/product/215291.jsp
Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and General Model; CCMB-2012-09-001, Version 3.1, Revision 4 (September 2012)
Abrahamsson, D.: Security Enhanced Firmware Update Procedures in Embedded Systems. Master’s thesis, Linköping University, Department of Computer and Information Science (2008)
Consortium, T.M.: The MULTOS Specification, http://www.multos.com
Corp., O.: Java Card, http://www.oracle.com/technetwork/java/javacard
Eurosmart: Protection Profile Security IC Platform Protection Profile developed by Atmel, Infineon Technologies AG, NXP Semiconductors, Renesas Technology Europe Ltd., STMicrocontrollers, Registered and Certified by Bundesamt für Sicherheit in der Informationstechnik (BSI) under Reference BSI-PP-0035, Version 1.0, 15.06 (June 2007), https://www.bsi.bund.de/SharedDocs/Zertifikate/PP/aktuell/PP_0035.html
Eurosmart: Security Integrated Circuit Platform Protection Profile with Augmentation Packages developed by Inside Secure, Infineon Technologies AG, NXP Semiconductors, STMicroelectronics, Registered and Certified by Bundesamt für Sicherheit in der Informationstechnik (BSI) under Reference BSI-CC-PP-0084-2014, Version 1.0, 19.02 (February 2014), https://www.bsi.bund.de/SharedDocs/Zertifikate/PP/aktuell/PP_0084.html
Giuffrida, C., Kuijsten, A., Tanenbaum, A.S.: Safe and automatic live update for operating systems. In: Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2013, pp. 279–292. ACM, New York (2013), http://doi.acm.org/10.1145/2451116.2451147
GlobalPlatform, I.: GlobalPlatform, http://www.globalplatform.org/
Lobdell, M.: Robust Over-the-Air Firmware Updates Using Program Flash Memory Swap on Kinetis Microcontrollers, http://cache.freescale.com/files/microcontrollers/doc/app_note/AN4533.pdf
Margraf, M.: The new german id card. In: Pohlmann, N., Reimer, H., Schneider, W. (eds.) ISSE 2010: Securing Electronic Business Processes (2011)
Noll, M.: System for a primary bios rom recovery in a dual bios rom computer system. US Patent 5,793,943 (August 11, 1998), http://www.google.com/patents/US5793943
Noubissi, A.C., Iguchi-Cartigny, J., Lanet, J.L.: Hot updates for java based smart cards. In: 22nd International Conference on Data Engineering Workshops, pp. 168–173 (2011)
Rankl, W., Effing, W.: Smart Card Handbook, 4th edn. Wiley Publishing (2010)
Skorobogatov, S., Woods, C. In: the blink of an eye: There goes your aes key. Cryptology ePrint Archive, Report 2012/296 (2012), http://eprint.iacr.org/2012/296
Smith, S., Weingart, S.: Building a high-performance, programmable secure coprocessor. Comput. Netw. 31, 831–860 (1999), http://domino.research.ibm.com/comm/research_projects.nsf/pages/ssd_scop.pubs.html
Torrance, R., James, D.: The state-of-the-art in IC reverse engineering. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 363–381. Springer, Heidelberg (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Beilke, K., Roth, V. (2015). A Safe Update Mechanism for Smart Cards. In: Focardi, R., Myers, A. (eds) Principles of Security and Trust. POST 2015. Lecture Notes in Computer Science(), vol 9036. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-46666-7_13
Download citation
DOI: https://doi.org/10.1007/978-3-662-46666-7_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-46665-0
Online ISBN: 978-3-662-46666-7
eBook Packages: Computer ScienceComputer Science (R0)