{"title":"Smart card security evaluation: Community solutions to intractable problems","authors":"Tony Boswell","doi":"10.1016/j.istr.2009.06.002","DOIUrl":null,"url":null,"abstract":"<div><p>Evaluation of smart card security faced seemingly intractable problems of consistency and repeatability in its early days. The deeply specialised technologies, large parameter spaces for attacks, and the evolving attack types and countermeasures mean that the scope for variation in evaluation practice, and hence in evaluation conclusions, is potentially huge. The situation is further complicated by the fact that countermeasures against some types of attacks depend on both hardware and software, but there is also a need to evaluate hardware without specific software present at the time of evaluation. Stakeholders in the smart card world have formed a Community that has successfully created and applied interpretation of Common Criteria (ISO 15408) to deal with this problem and to achieve international mutual recognition of evaluation results. This paper discusses examples of the smart card security problem in order to illustrate some of the difficulties, and describes some of the interpretation that has been defined for rating the difficulty of an attack via calculation of an attack potential. It also considers the nature of the Community that has enabled the interpretation to be both defined and put into practice successfully.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"14 2","pages":"Pages 57-69"},"PeriodicalIF":0.0000,"publicationDate":"2009-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2009.06.002","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Security Technical Report","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1363412709000181","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
Evaluation of smart card security faced seemingly intractable problems of consistency and repeatability in its early days. The deeply specialised technologies, large parameter spaces for attacks, and the evolving attack types and countermeasures mean that the scope for variation in evaluation practice, and hence in evaluation conclusions, is potentially huge. The situation is further complicated by the fact that countermeasures against some types of attacks depend on both hardware and software, but there is also a need to evaluate hardware without specific software present at the time of evaluation. Stakeholders in the smart card world have formed a Community that has successfully created and applied interpretation of Common Criteria (ISO 15408) to deal with this problem and to achieve international mutual recognition of evaluation results. This paper discusses examples of the smart card security problem in order to illustrate some of the difficulties, and describes some of the interpretation that has been defined for rating the difficulty of an attack via calculation of an attack potential. It also considers the nature of the Community that has enabled the interpretation to be both defined and put into practice successfully.