Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Elaine R. Palmer is active.

Publication


Featured researches published by Elaine R. Palmer.


financial cryptography | 1998

Using a High-Performance, Programmable Secure Coprocessor

Sean W. Smith; Elaine R. Palmer; Steve Harris Weingart

Unsecure computational environments threaten many financial cryptography implementations, and other sensitive computation. High-performance secure coprocessors can address these threats. However, using this technology for practical security solutions requires overcoming numerous technical and business obstacles. These obstacles motivate building a high-performance secure coprocessor that balances security with easy third-party programmability—but these obstacles also provide many design challenges. This paper discusses some of issues we faced when attempting to build such a device.


Operating Systems Review | 2008

The Caernarvon secure embedded operating system

David C. Toll; Paul A. Karger; Elaine R. Palmer; Suzanne K. McIntosh; Sam Weber

The Caernarvon operating system was developed to demonstrate that a high assurance system for smart cards was technically feasible and commercially viable. The entire system has been designed to be evaluated under the Common Criteria at EAL7, the highest defined level of assurance. Historically, smart card processors have not supported the hardware protection features necessary to separate the OS from the applications, and one application from another. The Caernarvon OS has taken advantage of the first smart card processors with such features to be the first smart card OS to provide this kind of protection. Even when compared with conventional systems where the hardware protection is routine, the Caernarvon OS is noteworthy, because of the EAL7 assurance. This approach facilitated implementation of a formally specified, mandatory security policy providing multi-level security (MLS) suitable for both government agencies and commercial users. The mandatory security policy requires effective authentication of its users that is independent of applications. For this reason, the Caernarvon OS also contains a privacy-preserving, two-way authentication protocol integrated with the Mandatory Security Policy. The Caernarvon OS includes a strong cryptographic library that has been separately certified under the Common Criteria at EAL5+ for use with other systems. The Caernarvon OS implements a secure method for downloading trusted and untrusted application software and data in the field, with the assumption that all applications are potentially hostile. While the initial platform for the operating system was smart cards, the design could also be used in other embedded devices, such as USB tokens, PDAs, cell phones, etc.


ieee symposium on security and privacy | 2011

Lessons Learned: Building the Caernarvon High-Assurance Operating System

Paul A. Karger; Suzanne K. McIntosh; Elaine R. Palmer; David C. Toll; Samuel Weber

This article features lessons learned in designing, developing, and testing features for a high-assurance smart card operating system. In particular, this paper describes software design, development, and testing process, and the advantages reaped from following established process guidelines. The authors describe the project impact experienced from external influences and count among them market pressure from a rapidly changing commercial landscape which demands agility in order to assure continued funding and product success.


american control conference | 1987

The Design Analysis for Reliability Tool

Sarah Jean Hood; Elaine R. Palmer

The goal of the Design Analysis for Reliability Tool (DART) is to provide the designer of dynamic physical systems with a mathematical modeling tool. DART automates some of the steps involved in building mathematical models. The bond graph method is used as the dynamic system representation. The bond graph is entered into DART through a graphic interface. The state equations are derived from the bond graph. Specific constitutive laws for the general relationships represented by the bond graph nodes are entered through a full screen editor. The equations are solved using the Dynamic Simulation Language (DSL). DART generates and solves equations for the class of problems with state equations of the form dx/dt = ¿(x, u). DART generates but cannot solve state equations of the form dx/dt = ¿(x, dx/dt, u) because DSL does not handle implicit equations of this type. DART does handle algebraic implicit equations.


smart card research and advanced application conference | 2010

Designing a side channel resistant random number generator

Suresh Chari; Vincenzo V. DiLuoffo; Paul A. Karger; Elaine R. Palmer; Tal Rabin; Josyula R. Rao; Pankaj Rohotgi; Helmut Scherzer; Michael Steiner; David C. Toll

This paper describes the design of the random number generator (RNG) in the Caernarvon high assurance smart card operating system. Since it is used in the generation of cryptographic keys and other sensitive materials, the RNG has a number of stringent security requirements that the random bits must be of good quality i.e. the bits must not be predictable or biased. To this end, a number of standards such as the German AIS 31 mandate that true random bits be continuously tested before use in sensitive applications such as key generation. A key issue in implementing this standard is that such testing before use in key generation greatly increases the attack surface for side-channel attacks. For example, template attacks which can extract information about the random bits from even a single run provided we use the same bits at many different points in the computation. Because of these potential risks, the Caernarvon operating system uses pseudo random number generators which are initially seeded by externally generated high quality random bits, and then perturbed by bits from the true random number generator. We describe a PRNG design which yields high quality random bits while also ensuring that it is not susceptible to side-channel attacks and provide an informal argument about its effectiveness.


financial cryptography | 2010

Implementing a high-assurance smart-card OS

Paul A. Karger; David C. Toll; Elaine R. Palmer; Suzanne K. McIntosh; Sam Weber; Jonathan W. Edwards

Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.


international symposium on software reliability engineering | 2008

The Feasibility of Automated Feedback-Directed Specification-Based Test Generation: A Case Study of a High-Assurance Operating System

Sam Weber; Amitkumar M. Paradkar; Suzanne K. McIntosh; David C. Toll; Paul A. Karger; Matthew Kaplan; Elaine R. Palmer

In this paper, we describe results of a case study to establish the feasibility of deriving mappings between an abstract user level specification and the code elements in a concrete implementation of a highly secure smart card operating system. Such a mapping is necessary for feedback-directed specification-based test generation to improve code coverage, needed by the stringent criteria for high-assurance systems. We used test cases generated from the user level specification to identify the executed code elements and attempted to use static analysis to map the unexecuted code elements to the corresponding elements in the user level specification. Our primary result is evidence that, given a sufficiently expressive user level specification and a test generation system that is able to effectively use such a specification, the resulting tests will cover the vast majority of the code branches that are able to be covered. Therefore, the benefit of a feedback-directed system will be limited. We further provide evidence that the static analysis required to generate feedback in these cases tends to be difficult, involving inferring the semantics of the internal implementation of data structures. In particular, we observed that the internal states at the implementation level in a high security application pose significant challenges to this mapping process.


Archive | 1997

Method and system for processing electronic documents

Milton M. Anderson; Frank Jaffe; Chris Hibbert; Jyri Virkki; Jeffrey Kravitz; Sheveling Chang; Elaine R. Palmer


Archive | 1998

Authenticated electronic coupon issuing and redemption

Charles C. Palmer; Elaine R. Palmer; Sean W. Smith


Archive | 1998

Vehicle customization, restriction, and data logging

Kenneth Alan Goldman; Charles C. Palmer; Elaine R. Palmer

Researchain Logo
Decentralizing Knowledge