Formal Verification of Security Properties of Smart Card Embedded Source Code
Authors
Axalto - Smart card Research
Université Paris-Sud
Abstract
This paper reports on a method to handle the verification of various security properties of imperative source code embedded on smart cards. The idea is to combine two program verification approaches: the functional verification at the source code level and the verification of high level properties on a formal model built from the program and its specification. The method presented uses the Caduceus tool, built on top of the Why tool. Caduceus enables the verification of an annotated C program and provides a validation process that we used to generate a high level formal model of the C source code. This method is illustrated by an example extracted from the verification of a smart card embedded operating system.
BibTeX Entry
@inproceedings{Andronick_CP_05, address = {Newcastle, UK}, author = {June Andronick and Boutheina Chetali and Christine Paulin-Mohring}, booktitle = {International Symposium on Formal Methods (FM)}, doi = {10.1007/11526841_21}, editor = {J. Fitzgerald and I. J. Hayes and A. Tarlecki}, month = jul, pages = {302--317}, paperUrl = {https://trustworthy.systems/publications/papers/Andronick_CP_05.pdf}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, title = {{Formal Verification of Security Properties of Smart Card Embedded Source Code}}, volume = {3582}, year = {2005} }