usenix conference policies
Breaking Up Is Hard To Do: Modeling Security Threats for Smart Cards
Abstract:
Smart card systems differ from conventional computer systems in that different aspects of the system are not under a single trust boundary. The processor, I/O, data, programs, and network may be controlled by different, and hostile, parties. We discuss the security ramifications of these "splits" in trust, showing that they are fundamental to a proper understanding of the security of systems that include smart cards.
BibTeX
@inproceedings {271689,
author = {Adam Shostack},
title = {Breaking Up Is Hard To Do: Modeling Security Threats for Smart Cards},
booktitle = {USENIX Workshop on Smartcard Technology (Smartcard 99)},
year = {1999},
address = {Chicago, IL},
url = {https://www.usenix.org/conference/usenix-workshop-smartcard-technology/breaking-hard-do-modeling-security-threats-smart},
publisher = {USENIX Association},
month = may
}
author = {Adam Shostack},
title = {Breaking Up Is Hard To Do: Modeling Security Threats for Smart Cards},
booktitle = {USENIX Workshop on Smartcard Technology (Smartcard 99)},
year = {1999},
address = {Chicago, IL},
url = {https://www.usenix.org/conference/usenix-workshop-smartcard-technology/breaking-hard-do-modeling-security-threats-smart},
publisher = {USENIX Association},
month = may
}
connect with us