USENIX Technical Program - Abstract - Smartcard 99
Breaking Up Is Hard to Do: Modeling Security Threats for Smart Cards
Bruce Schneier, Counterpane Systems; Adam Shostack, Netect, Inc.
Abstract
Smart card systems differ from conventional computer systems in that different aspects of the system are not under a single trust boundary. The processor, I/O, data, programs, and network may be controlled by different, and hostile, parties. We discuss the security ramifications of these "splits" in trust, showing that they are fundamental to a proper understanding of the security of systems that include smart cards.
- View the full text of this paper in
HTML form and
PDF form.
- If you need the latest Adobe Acrobat Reader, you can download it from Adobe's site.
- To become a USENIX Member, please see our Membership Information.
|