DUAL SECURITY FOR SMART CARD
Keywords:
Various security diagrams, threat modeling, attack trees, vulnerabilities, semi Markov chains, generic transition matrices, and steady-state security are usedAbstract
In this work, we provide a Secure System development Life Cycle Approach to address software
security concerns throughout the early phases of system development. Here, we examine the need for security by
comparing it to the needs for functionality.Use use case, attack tree, threat modeling, and risk assessment to design
a secure smart card system and architecture. Examining the smart card microcontroller via static and dynamic
analysis, and then putting the different security testing methods to use. This work uses the Semi-Marchov Chain
and the Steady state matrix to assess the security improvement of a smart card's SDLC for various attack levels.
The Security State Diagram is a useful tool for evaluating the safety of any smart card driver. Because of the
disparity in security levels between the integrated and series systems, an improvement in security may be
calculated.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.










