Skip to main content
USENIX
  • Conferences
  • Students
Sign in

connect with us


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

twitter

Tweets by @usenix

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home ยป Breaking Up Is Hard To Do: Modeling Security Threats for Smart Cards
Tweet

connect with us

Breaking Up Is Hard To Do: Modeling Security Threats for Smart Cards

Abstract: 

Smart card systems differ from conventional computer systems in that different aspects of the system are not under a single trust boundary. The processor, I/O, data, programs, and network may be controlled by different, and hostile, parties. We discuss the security ramifications of these "splits" in trust, showing that they are fundamental to a proper understanding of the security of systems that include smart cards.

Adam Shostack, Netect, Inc.

BibTeX
@inproceedings {271689,
author = {Adam Shostack},
title = {Breaking Up Is Hard To Do: Modeling Security Threats for Smart Cards},
booktitle = {USENIX Workshop on Smartcard Technology (Smartcard 99)},
year = {1999},
address = {Chicago, IL},
url = {https://www.usenix.org/conference/usenix-workshop-smartcard-technology/breaking-hard-do-modeling-security-threats-smart},
publisher = {USENIX Association},
month = may,
}
Download

Links

Paper: 
http://usenix.org/publications/library/proceedings/smartcard99/full_papers/schneier/schneier.pdf
Paper (HTML): 
http://usenix.org/publications/library/proceedings/smartcard99/full_papers/schneier/schneier_html/index.html
  • Log in or    Register to post comments

© USENIX

  • Privacy Policy
  • Contact Us