<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>On the road to Bandol &#187; e-Smart</title>
	<atom:link href="https://javacard.vetilles.com/tag/e-smart/feed/" rel="self" type="application/rss+xml" />
	<link>https://javacard.vetilles.com</link>
	<description>A weblog on Java Card, security, and other things personal</description>
	<lastBuildDate>Mon, 18 Aug 2025 06:48:26 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.32</generator>
	<item>
		<title>E-smart becomes Chip-to-Cloud</title>
		<link>https://javacard.vetilles.com/2012/02/06/e-smart-becomes-chip-to-cloud/</link>
		<comments>https://javacard.vetilles.com/2012/02/06/e-smart-becomes-chip-to-cloud/#comments</comments>
		<pubDate>Mon, 06 Feb 2012 09:47:54 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[e-Smart]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=789</guid>
		<description><![CDATA[After over 10 years, e-Smart is changing its name to become the Chip-to-Cloud Security Forum (which will also replace the other conferences from the Smart Event). This looks like a welcome move from card-centered business to application-centered business, reflecting what is happening in the industry. The technology is now ready, and it has not evolved [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>After over 10 years, e-Smart is changing its name to become the <a href="http://www.chip-to-cloud.com/" class="liexternal">Chip-to-Cloud Security Forum</a> (which will also replace the other conferences from the Smart Event). This looks like a welcome move from card-centered business to application-centered business, reflecting what is happening in the industry.</p>
<p>The technology is now ready, and it has not evolved greatly in the past few years. Java Card and GlobalPlatform are mature, widely deployed technologies; many companies are able to develop and deploy cards. Of course, there are a few technical challenges remaining, to keep engineers busy. One of the most challenging tasks is the establishment of trust between the various actors of the industry; today, formal security certification is at the heart of this, but something a bit more innovative will most likely be required here.</p>
<p>The new frontier for cards and secure elements are applications. This is much harder than implementing technology, and requires a lot of innovation. Will we be able to differentiate smart cards from tags? Will we find a room for card applications between basic SIM authentication and TEE applications? Will there at some point be a way to work on this? That&#8217;s the Chip-to-Cloud challenge, and I hope to get a few interesting answers next September.</p>
<p>The <a href="http://www.chip-to-cloud.com/call-for-papers" class="liexternal">Call for Papers</a> is out now, so go ahead, propose things. I am convinced that this conference will remain one of the places where academics, industrial R&#038;D, and technical marketing people are able to meet and exchange. See you there!</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/02/06/e-smart-becomes-chip-to-cloud/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Live from #esmart: Security, Privacy and Trust for Web Services</title>
		<link>https://javacard.vetilles.com/2009/09/24/live-from-esmart-security-privacy-and-trust-for-web-services/</link>
		<comments>https://javacard.vetilles.com/2009/09/24/live-from-esmart-security-privacy-and-trust-for-web-services/#comments</comments>
		<pubDate>Thu, 24 Sep 2009 15:17:38 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[e-Smart]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[trust]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=461</guid>
		<description><![CDATA[The first presentation of the session about Web and Cards is from Xavier Larduinat, speaking on behalf of Eurosmart (a non-profit organization advocating smart secure devices). His interest is here to look at things from the point of view of the user of a Web service, and to figure out how to get a feeling [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>The first presentation of the session about Web and Cards is from Xavier Larduinat, speaking on behalf of Eurosmart (a non-profit organization advocating smart secure devices). His interest is here to look at things from the point of view of the user of a Web service, and to figure out how to get a feeling of security when using services like gmail, Flickr, Twitter, or others. I give below some of the ideas put forward during that talk, with a few personal comments.</p>
<p>The first question is to understand how privacy and trust are similar and different from the typical security issue. A first interesting thing is that the smart card industry is one of the rare industries that is able to ship 4 billion personalized objects every year. That makes it suitable for use with companies like Google or Yahoo! who deal with hundreds of millions of customers.</p>
<p>The kind of things that smart card vendors usually propose in the Web arena are the following:</p>
<ul>
<li>Two-factor authentication. This can be provided in the form of OTP (one-time-password) applications, or solutions reusing the eID infrastructure using in goverment applications.</li>
<li>Privacy enhancements. A card may securely store credentials, and only release them as needed and required (with appropriate proof), without disclosing the entire information. Think of a system that would simply assure that you are over 18, without disclosing your name.</li>
<li>Identity management. Identity with a token can improve authentication with Web mail, instant messaging, and more, and then allow the enforcement of better access control policies.</li>
</ul>
<p> The next issue is to figure out how this matches the needs of digital security, which are as follows:</p>
<ul>
<li>Protecting our digital identities. That&#8217;s something where smart objects can bring an immediate value, as we have seen ajust above.</li>
<li>Protecting our digital assets. Our assets on the Web are very varied (contacts, images, and all kinds of content) need to be protected, from other people, and also from the Web service providers, who may be tempted to abuse them.</li>
<li>Protecting our e-transactions. Online transactions today are often very simple, and involve a low-level of security. There are proposals from the smart card industry, but they do not always match the requirements of Web service providers.</li>
</ul>
<p>This view is very valid, but it is also a very traditional view of digital security. It may be more interesting to look at the things that become possible when our digital assets are well protected. By bringing more security, we bring more value and more freedom to the users, because there will be new ways to exploit these assets, which are not possible today. Eventually,  mandating a higher level of digital security brings more choices to the end user, not less choices.<br />
<span id="more-461"></span></p>
<p>If we dig a bit deeper into Web services, we all love them because of their ubiquity. They are accessible from anywhere, they don&#8217;t put constraints on us like updates and backups. We love this, but we also need to be aware that there is a tradeoff between availability and security.</p>
<p>As an example, the tendency towards free, viral services that later monetize their user&#8217;s data suffers a few exceptions. In particular, there are few such services around money management and personal health record management. This means that most users don&#8217;t place enough trust in Web services to allow them to manage what they regard as their most sensitive data. The kind of issues that Web services face include the following:</p>
<ul>
<li>No network, no service. This is slowly becoming a thing of the past. Slowly in some cases (roaming, for instance). We can provide solutions, but they should not be our main focus.</li>
<li>Security limited to username and password. There isn&#8217;t much worse in terms of security.</li>
<li>Privacy. Users basically have no choice. You need to accept the service provider&#8217;s conditions, or use another service.</li>
<li>Trust. There are no standard metrics to establish trust like there can be in the smart card business.</li>
</ul>
<p>If we focus even more on security, privacy and trust, the challenges for Web services are as follows, from the user&#8217;s prospective:</p>
<ul>
<li>Identity theft.</li>
<li>Unclear data access control</li>
<li>Unclear service definition</li>
<li>Unclear terms and conditions</li>
</ul>
<p>Another aspect of things is data protection, which is another set of user worries:</p>
<ul>
<li>Storage. Where is my data? What is the disaster process? How are permissions set? How can I control the access to my data?</li>
<li>Revision Management. Is there a tracability of the changes? A possibility to be warned of canges? A possibility to track changes and review them later?</li>
<li>Life cycle (retention/termination). How to terminate hosting data?</li>
</ul>
<p>Next, we get into the heart of the topic: what is it possible to offer from the smart secure devices point of view? The first initiative is about transforming the World Wide Web into My Web, by combining several aspects that restrict accesses: </p>
<ul>
<li>IP Geo-Localization. Make some services accessible only when I am located in a given area or set of areas.</li>
<li>Appliances ID restricted access. Make some services accessible only from some computer (based on a more or less secure characteristic of the computer).</li>
<li>Time restricted access. Make some service accessible only at a given time, like allowing children to access instant messaging only between 4:00PM and 8:00PM.</li>
</ul>
<p>Next, there are solutions for data protection: </p>
<ul>
<li>Data encryption, RAID applied to data centers, with smart secure devices controlling it.</li>
<li>Smart Secure Devices acting as Proxy server. Re-route SOAP messaging via a proxy, and apply some filtering at that level.</li>
</ul>
<p>The last idea consists in plugging a Smart Card Web Server into a fixed device (for instance, a home gateway, or &#8220;box&#8221;), and to make it accessible from Internet. Such a device can have many uses, and its main advantage is that it is not with you at all times. There are many applications for this, ranging from basic secure proxy/filter to two-factor authentication. Of course, there is a trick here, since your second factor is actually on the Internet, so you will need to use a different kind of credential on these things, to prove who you are. One of them, provided by Xavier Larduinat, consists in presenting you the pictures of 20 random Facebook members, including your friend Alice, and to ask you to click on Alice&#8217;s picture. I&#8217;ll come back on authentication in later posts, because there are many new ideas in this area.</p>
<p>To conclude, Eurosmart pushes in favor or regulation, in particular at the European level: </p>
<ul>
<li>Rules about identity ownership and accountability.</li>
<li>Data protection as a fundamental right</li>
</ul>
<p>Such regulations could be interesting, mostly because they would facilitate the establishment of trust between users and service providers, which would in turn make the development of new services, based on that new trust, that could grealty enhance the user experience.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2009/09/24/live-from-esmart-security-privacy-and-trust-for-web-services/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>e-Smart is back &#8230;</title>
		<link>https://javacard.vetilles.com/2009/09/19/e-smart-is-back/</link>
		<comments>https://javacard.vetilles.com/2009/09/19/e-smart-is-back/#comments</comments>
		<pubDate>Sat, 19 Sep 2009 13:54:13 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[e-Smart]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[smart card]]></category>
		<category><![CDATA[Smart Mobility]]></category>
		<category><![CDATA[Smart University]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=440</guid>
		<description><![CDATA[It&#8217;s that time of the year when summer turns in to fall (rather violently around here), and when smart card R&#038;D people gather in Sophia Antipolis for the Smart Event. I will be present throughout the week, with quite a busy schedule, between my own participations and the interesting sessions that I want to hear. [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>It&#8217;s that time of the year when summer turns in to fall (rather violently around here), and when smart card R&#038;D people gather in Sophia Antipolis for the Smart Event. I will be present throughout the week, with quite a busy schedule, between my own participations and the interesting sessions that I want to hear.</p>
<p>Let me get you a biased timeline for this week, from Tuesday to Friday.<br />
<span id="more-440"></span></p>
<p>Let&#8217;s start by Tuesday:</p>
<ul>
<li>The <a href="http://www.strategiestm.com/conferences/smart-event/09/smart-university/program_javacard.htm" class="liexternal">Java Card 3.0 Programming</a> course at <a href="http://www.strategiestm.com/conferences/smart-event/09/smart-university/program.htm" class="liexternal">Smart University</a> lasts all Tuesday and Wednesday. My personal contribution in it is about security, on Tuesday afternoon. That should keep me busy for a full half-day.</li>
<li>If you are into contests (or if you are broke; this event is free), the new <a href="http://www.simagine.info/" class="liexternal">SIMagine</a> contest will be launched with a <a href="http://www.strategiestm.com/conferences/smart-event/09/workshops/index.htm#" class="liexternal">full-day conference</a> on Tuesday. This is not a Gemalto contest any more, but a wider contest, which is not limited to cards any more (even though I guess that involving a card in this could be a good idea). If you have a good mobile security idea (with a SIM card), that could be of interest.</li>
</ul>
<p>Wednesday will be very busy, in particular because there are events on the side of the main conferences:</p>
<ul>
<li>In the morning, the Java Card Forum organizes a meeting with academia, to see how we can help in promoting research about Java Card 3.0. This event is invitational, but if you are an academic, present at e-Smart, and you are interested, you are welcome at 10:00AM (I am not sure of the room, but I am sure that there will be an indication; follow the JCF logo).</li>
<li>In the morning, I like the title of Jacques Bus&#8217; keynote speech, <a href="http://www.strategiestm.com/conferences/smart-event/09/e-smart/program.htm#opening" class="liexternal">Trust in digital life</a>. I usually skip keynotes, but I may attend that one.</li>
<li>In the afternoon, There are also interesting speeches at e-Smart. First, one of my colleagues, Guillaume Dufay, talking about a formal model of really open cards (old topic, with a new twist), <a href="http://www.strategiestm.com/conferences/smart-event/09/e-smart/program.htm#p1a2" class="liexternal">around 3:00PM</a>. Later in the afternoon, there will also be a speech from G&#038;D about a secure runtime in the mobile; finally, Trusted Logic has a competitor in that field, moving forward to prove its interest.</li>
<li>Finally, almost all of <a href="http://www.strategiestm.com/conferences/smart-event/09/smart-mobility/program.htm" class="liexternal">Smart Mobility</a>&#8216;s <a href="http://www.strategiestm.com/conferences/smart-event/09/smart-mobility/program.htm#p1a1" class="liexternal">afternoon sessions</a> sound interesting, for various reasons. Tough choices ahead &#8230;</li>
</ul>
<p>Thursday will not be dull either, although I will finally be able to fully focus on the conferences:</p>
<ul>
<li>The <a href="http://www.strategiestm.com/conferences/smart-event/09/e-smart/program.htm#p2m1" class="liexternal">morning</a> at e-Smart will be a combination of NFC Security and Trusted Personal Devices. Two topics of interest for me, so I may be surfing between sessions.</li>
<li>Smart Mobility will bring us some discussions about the NFC ecosystems (TSMs and more), and about user experience. Interesting, but I have the feeling that there a few more new things at e-Smart (I may be wrong, though).</li>
<li>The first part of the afternoon is a no-brainer, at least for me. I will be on the stage, talking about Java Card 3.0 and Smart Card Web Server Security. My co-presenters, from Gemalto/Eurosmart and from Inside, will also have interesting speeches about cloud computing and about convergence.</li>
<li>If this is not you cup of tea, the <a href="http://www.strategiestm.com/conferences/smart-event/09/e-smart/program.htm#p2a1" class="liexternal">other session</a> of e-Smart could be very interesting, about state-of-the-art security. I am likely to join that session after break.</li>
<li>On the Smart Mobility side, my choice would go to the <a href="http://www.strategiestm.com/conferences/smart-event/09/smart-mobility/program.htm#p2a2" class="liexternal">Mobile banking</a> session, but mostly because I know about mots of the things presented in the other session.</li>
</ul>
<p>Friday is morning only, but that is quite a dense morning:</p>
<ul>
<li>At e-Smart, it is the <a href="http://www.strategiestm.com/conferences/smart-event/09/e-smart/program.htm#p3m1" class="liexternal">Java Card</a> session. The first part is quite introductive, with the amusing PlaySIM project (already discussed <a href="http://javacard.vetilles.com/2009/06/04/live-from-j1-the-playsim-project/" class="liinternal">here</a>). The second part includes two speeches about attacks; expect to find me there.</li>
<li>In parallel, Smart Mobility has a special TL session, with 4 consecutive speakers from Trusted Logic and Trusted Labs. I may miss some of them because of the Java Card session, but they are all worth it.</li>
</ul>
<p>Finally, I will try to be connected, like usually in conferences. I will be on Twitter (<a href="http://twitter.com/evetillard" class="liexternal">evetillard</a>), with the tag <a href="http://twitter.com/#search?q=%23esmart" class="liexternal">#esmart</a> (join me using it), and I will also try to blog live about the most exciting things.  </p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2009/09/19/e-smart-is-back/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Live from e-Smart: Nijmegen strikes again</title>
		<link>https://javacard.vetilles.com/2008/09/19/live-from-esmart-nijmegen-strikes-again/</link>
		<comments>https://javacard.vetilles.com/2008/09/19/live-from-esmart-nijmegen-strikes-again/#comments</comments>
		<pubDate>Fri, 19 Sep 2008 10:00:39 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Java Card 2.x]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[bytecode]]></category>
		<category><![CDATA[e-Smart]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Java Card]]></category>
		<category><![CDATA[verifier]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/2008/09/19/live-from-esmart-nijmegen-strikes-again/</guid>
		<description><![CDATA[Wojciech Mostowski is a researcher from the Radboud University Nijmegen, and he is a frequent speaker at e-Smart. He even wa a finalist for the Java Card Forum a while ago. He has been spending years looking very closely at the Java Card specifications, trying to find issues in cards. Today, he is getting at [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.cs.ru.nl/~woj/" class="liexternal">Wojciech Mostowski</a> is a researcher from the Radboud University Nijmegen, and he is a frequent speaker at e-Smart. He even wa a finalist for the Java Card Forum a while ago. He has been spending years looking very closely at the Java Card specifications, trying to find issues in cards. Today, he is <a href="http://www.cs.ru.nl/~woj/papers/download/esmart2008-slides.pdf" class="lipdf">getting at the firewall</a>.</p>
<p>It seems that logical attacks on Java Card are quite trendy these days, as several teams seem to work on them. On the firewall, the idea is here that the Java Card specifications assume type correctness, but that this correctness is not actually guaranteed, because in most cases, bytecode  verification is not performed on the card, which means that incorrect applications can be loaded.</p>
<p>The presentation starts with a few compliance tests, of course based on cornercases. They found a few issues, but nothing really bad. It may be possible in some cases to get the type of an object when you shouldn&#8217;t, or to use a transient array when it should not be accessible, but in the end, there is no way to get anythingreally  interesting done.</p>
<p>The next item is much more interesting. His idea is to create type confusion on files that are apparently correct, simply by using two different definitions of the Shareable interface: one for the client, and one for the server, with different definitions. For instance:</p>
<p>On the client side:</p>
<pre>
public interface Bad extends Shareable {
  public void doDamage(<strong><font color="#660066">AID aid</font></strong>);
}
</pre>
<p>On the server side:</p>
<pre>
public interface Bad extends Shareable {
  public void doDamage(<strong><font color="#660066">byte[] ba</font></strong>);
}
</pre>
<p>If you verify the client with its definition of the interface, and the server with its own version, verification will succeed in both cases. However, the type confusion is obvious. And in this case, the &#8220;bad&#8221; part is that the AID is a JCRE entry-point object, with high privileges. and this allows an attacker to do bad things. I won&#8217;t go further here, but details are available on the <a href="http://www.cs.ru.nl/~woj/papers/download/esmart2008-slides.pdf" class="lipdf">slides</a>. </p>
<p>Overall, it is nice to see that Java Card logical attacks get exposed. The potential impact is in practice minimal, because it is very difficult for hackers to load applications in deployed cards (since a GlobalPlatform authentication is typically required). Nevertheless, with NFC and other &#8220;open&#8221; schemes, the number of downloaded applications is likely to raise quite fast, and the risk of getting malware in the card may slightly increase (developers remain well identified, so the risk is likely to remain low).</p>
<p>This means that bytecode verification needs to be systematically performed, and that this verification needs to be performed by taking into account the actual context in which the application will be exploited. The exploit above is only possible because the server and client have been verified with respect to different contexts.</p>
<p>Recent multi-application projects, such as the Pegasus project in France, have defined strong requirements in this matter, and we are getting closer to exploiting a complete verification environment, which was my first assignment as a Trusted Logic employee, about 8 years ago. Time to get this code out of the closet&#8230;</p>
<p>Oh, I almost forgot. Of course, Java Card 3.0 addresses this issue, at least in its Connected edition, where on-card bytecode verification is mandatory.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2008/09/19/live-from-esmart-nijmegen-strikes-again/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
