{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:35:50Z","timestamp":1750307750435,"version":"3.41.0"},"reference-count":29,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGOPS Oper. Syst. Rev."],"published-print":{"date-parts":[[2008,1]]},"abstract":"<jats:p>The Caernarvon operating system was developed to demonstrate that a high assurance system for smart cards was technically feasible and commercially viable. The entire system has been designed to be evaluated under the Common Criteria at EAL7, the highest defined level of assurance.<\/jats:p>\n          <jats:p>Historically, smart card processors have not supported the hardware protection features necessary to separate the OS from the applications, and one application from another. The Caernarvon OS has taken advantage of the first smart card processors with such features to be the first smart card OS to provide this kind of protection. Even when compared with conventional systems where the hardware protection is routine, the Caernarvon OS is noteworthy, because of the EAL7 assurance.<\/jats:p>\n          <jats:p>This approach facilitated implementation of a formally specified, mandatory security policy providing multi-level security (MLS) suitable for both government agencies and commercial users. The mandatory security policy requires effective authentication of its users that is independent of applications. For this reason, the Caernarvon OS also contains a privacy-preserving, two-way authentication protocol integrated with the Mandatory Security Policy.<\/jats:p>\n          <jats:p>The Caernarvon OS includes a strong cryptographic library that has been separately certified under the Common Criteria at EAL5+ for use with other systems. The Caernarvon OS implements a secure method for downloading trusted and untrusted application software and data in the field, with the assumption that all applications are potentially hostile. While the initial platform for the operating system was smart cards, the design could also be used in other embedded devices, such as USB tokens, PDAs, cell phones, etc.<\/jats:p>","DOI":"10.1145\/1341312.1341320","type":"journal-article","created":{"date-parts":[[2008,2,8]],"date-time":"2008-02-08T15:32:16Z","timestamp":1202484736000},"page":"32-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["The Caernarvon secure embedded operating system"],"prefix":"10.1145","volume":"42","author":[{"given":"David C.","family":"Toll","sequence":"first","affiliation":[{"name":"IBM T. J. Watson Research Center, Yorktown Heights, NY"}]},{"given":"Paul A.","family":"Karger","sequence":"additional","affiliation":[{"name":"IBM T. J. Watson Research Center, Yorktown Heights, NY"}]},{"given":"Elaine R.","family":"Palmer","sequence":"additional","affiliation":[{"name":"IBM T. J. Watson Research Center, Yorktown Heights, NY"}]},{"given":"Suzanne K.","family":"McIntosh","sequence":"additional","affiliation":[{"name":"IBM T. J. Watson Research Center, Yorktown Heights, NY"}]},{"given":"Sam","family":"Weber","sequence":"additional","affiliation":[{"name":"IBM T. J. Watson Research Center, Yorktown Heights, NY"}]}],"member":"320","published-online":{"date-parts":[[2008,1]]},"reference":[{"key":"e_1_2_1_1_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/3-540-45937-5_5","volume-title":"Cryptographic Hardware and Embedded Systems -- CHES","author":"Agrawal D.","year":"2002","unstructured":"D. Agrawal , B. Archambeault , J. R. Rao , and P. Rohatgi . The EM side-channel(s) . In Cryptographic Hardware and Embedded Systems -- CHES 2002 , Lecture Notes in Computer Science , Vol. 2523 , Springer Verlag , pages 29 -- 45 , Redwood Shores, CA, 13--15 August 2002. D. Agrawal, B. Archambeault, J. R. Rao, and P. Rohatgi. The EM side-channel(s). In Cryptographic Hardware and Embedded Systems -- CHES 2002, Lecture Notes in Computer Science, Vol. 2523, Springer Verlag, pages 29--45, Redwood Shores, CA, 13--15 August 2002."},{"volume-title":"Comit\u00e9 Europ\u00e9en de Normalisation","year":"2004","key":"e_1_2_1_2_1","unstructured":"Application interface for smart cards used as secure signature creation devices -- part 1: Basic requirements. CWA 14890-1 , Comit\u00e9 Europ\u00e9en de Normalisation , Brussels, Belgium , March 2004 . URL: ftp:\/\/ftp.cenorm.be\/PUBLIC\/CWAs\/e-Europe\/eSign\/cwa14890-01-2004-Mar.pdf. Application interface for smart cards used as secure signature creation devices -- part 1: Basic requirements. CWA 14890-1, Comit\u00e9 Europ\u00e9en de Normalisation, Brussels, Belgium, March 2004. URL: ftp:\/\/ftp.cenorm.be\/PUBLIC\/CWAs\/e-Europe\/eSign\/cwa14890-01-2004-Mar.pdf."},{"volume-title":"Comit\u00e9 Europ\u00e9en de Normalisation","year":"2007","key":"e_1_2_1_3_1","unstructured":"Application interface for smart cards used as secure signature creation devices -- part 1: Basic requirements. prEN 14890-1:2007 , Comit\u00e9 Europ\u00e9en de Normalisation , Brussels, Belgium , March 2007 . Application interface for smart cards used as secure signature creation devices -- part 1: Basic requirements. prEN 14890-1:2007, Comit\u00e9 Europ\u00e9en de Normalisation, Brussels, Belgium, March 2007."},{"key":"e_1_2_1_4_1","volume-title":"Computer Security Model: Unified Exposition and Multics Interpretation. ESD-TR-75-306","author":"Bell D. E.","year":"1975","unstructured":"D. E. Bell and L. J. LaPadula . Computer Security Model: Unified Exposition and Multics Interpretation. ESD-TR-75-306 , The MITRE Corporation, Bedford, MA, HQ Electronic Systems Division, Hanscom AFB, MA , June 1975 . D. E. Bell and L. J. LaPadula. Computer Security Model: Unified Exposition and Multics Interpretation. ESD-TR-75-306, The MITRE Corporation, Bedford, MA, HQ Electronic Systems Division, Hanscom AFB, MA, June 1975."},{"key":"e_1_2_1_5_1","volume-title":"Integrity Considerations for Secure Computer Systems. ESD-TR-76-372","author":"Biba K. J.","year":"1977","unstructured":"K. J. Biba . Integrity Considerations for Secure Computer Systems. ESD-TR-76-372 , The MITRE Corporation , Bedford, MA , HQ Electronic Systems Division, Hanscom AFB, MA, Apr. 1977 . K. J. Biba. Integrity Considerations for Secure Computer Systems. ESD-TR-76-372, The MITRE Corporation, Bedford, MA, HQ Electronic Systems Division, Hanscom AFB, MA, Apr. 1977."},{"key":"e_1_2_1_6_1","volume-title":"Fifteenth IST Mobile & Wireless Communication Summit","author":"Bormann F. C.","year":"2006","unstructured":"F. C. Bormann , L. Manteau , A. Linke , J. C. Pailles , and J. van Dijk . Concept for trusted personal devices in a mobile and networked environment . In Fifteenth IST Mobile & Wireless Communication Summit , Myconos, Greece , June 2006 . F. C. Bormann, L. Manteau, A. Linke, J. C. Pailles, and J. van Dijk. Concept for trusted personal devices in a mobile and networked environment. In Fifteenth IST Mobile & Wireless Communication Summit, Myconos, Greece, June 2006."},{"key":"e_1_2_1_7_1","volume-title":"Policy for a common identification standard for federal employees and contractors. Homeland Security Presidential Directive HSPD-12","author":"Bush G. W.","year":"2004","unstructured":"G. W. Bush . Policy for a common identification standard for federal employees and contractors. Homeland Security Presidential Directive HSPD-12 , The White House , Washington, DC , 27 August 2004 . URL: http:\/\/csrc.nist.gov\/policies\/Presidential-Directive-Hspd-12.html. G. W. Bush. Policy for a common identification standard for federal employees and contractors. Homeland Security Presidential Directive HSPD-12, The White House, Washington, DC, 27 August 2004. URL: http:\/\/csrc.nist.gov\/policies\/Presidential-Directive-Hspd-12.html."},{"key":"e_1_2_1_8_1","first-page":"143","volume-title":"Advances in Cryptology -- Crypto","author":"Canetti R.","year":"2002","unstructured":"R. Canetti and H. Krawczyk . Security Analysis of IKE's Signature-Based Key-Exchange Protocol . In Advances in Cryptology -- Crypto 2002 , pages 143 -- 161 , Santa Barbara, CA , 2002. Lecture Notes in Computer Science , Vol. 2045 , Springer Verlag. R. Canetti and H. Krawczyk. Security Analysis of IKE's Signature-Based Key-Exchange Protocol. In Advances in Cryptology -- Crypto 2002, pages 143--161, Santa Barbara, CA, 2002. Lecture Notes in Computer Science, Vol. 2045, Springer Verlag."},{"key":"e_1_2_1_9_1","volume-title":"Protecting data & information: A workshop in computer & data security. Order No. EY-AX00080-SM-001","author":"Carter M. G.","year":"1982","unstructured":"M. G. Carter , S. B. Lipner , and P. A. Karger . Protecting data & information: A workshop in computer & data security. Order No. EY-AX00080-SM-001 , Digital Equipment Corporation , Maynard, MA, 1982 . M. G. Carter, S. B. Lipner, and P. A. Karger. Protecting data & information: A workshop in computer & data security. Order No. EY-AX00080-SM-001, Digital Equipment Corporation, Maynard, MA, 1982."},{"key":"e_1_2_1_10_1","volume-title":"United States Patent Application No. US 2006\/0104443A1","author":"Chari S. N.","year":"2004","unstructured":"S. N. Chari , V. V. Diluoffo , P. A. Karger , E. R. Palmer , T. Rabin , J. R. Rao , P. Rohatgi , H. Scherzer , M. Steiner , and D. C. Toll . Method, apparatus and system for resistence to side channel attacks on random number generators . United States Patent Application No. US 2006\/0104443A1 , Filed 12 November 2004 . S. N. Chari, V. V. Diluoffo, P. A. Karger, E. R. Palmer, T. Rabin, J. R. Rao, P. Rohatgi, H. Scherzer, M. Steiner, and D. C. Toll. Method, apparatus and system for resistence to side channel attacks on random number generators. United States Patent Application No. US 2006\/0104443A1, Filed 12 November 2004."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.21"},{"volume-title":"CCMB2005-08-001","year":"2005","key":"e_1_2_1_12_1","unstructured":"Common Criteria for Information Technology Security Evaluation, Parts 1, 2, and 3. Version 2.3 CCMB2005-08-001 , CCMB 2005 -08-002, and CCMB2005-08-003, August 2005. URL: http:\/\/www.commoncriteriaportal.org\/public\/expert\/index.php?menu=2. Common Criteria for Information Technology Security Evaluation, Parts 1, 2, and 3. Version 2.3 CCMB2005-08-001, CCMB2005-08-002, and CCMB2005-08-003, August 2005. URL: http:\/\/www.commoncriteriaportal.org\/public\/expert\/index.php?menu=2."},{"key":"e_1_2_1_13_1","volume-title":"DC","author":"Department","year":"1985","unstructured":"Department of defense trusted computer system evaluation criteria. DOD 5200.28-STD, Washington , DC , Dec. 1985 . URL: http:\/\/csrc.nist.gov\/publications\/history\/dod85.pdf. Department of defense trusted computer system evaluation criteria. DOD 5200.28-STD, Washington, DC, Dec. 1985. URL: http:\/\/csrc.nist.gov\/publications\/history\/dod85.pdf."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/363095.363143"},{"volume-title":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI)","year":"2001","key":"e_1_2_1_15_1","unstructured":"Functionality classes and evaluation methodology for physical random number generators. AIS 31, Version 1 , Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI) , Bonn, Germany , 25 Sept. 2001 . URL: http:\/\/www.bsi.bund.de\/zertifiz\/zert\/interpr\/ais31e.pdf. Functionality classes and evaluation methodology for physical random number generators. AIS 31, Version 1, Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI), Bonn, Germany, 25 Sept. 2001. URL: http:\/\/www.bsi.bund.de\/zertifiz\/zert\/interpr\/ais31e.pdf."},{"key":"e_1_2_1_16_1","volume-title":"The Internet Key Exchange (IKE). RFC","author":"Harkins D.","year":"1998","unstructured":"D. Harkins and D. Carrel . The Internet Key Exchange (IKE). RFC 2409, November 1998 . URL : ftp:\/\/ftp.rfc-editor.org\/in-notes\/rfc2409.txt. D. Harkins and D. Carrel. The Internet Key Exchange (IKE). RFC 2409, November 1998. URL: ftp:\/\/ftp.rfc-editor.org\/in-notes\/rfc2409.txt."},{"volume-title":"Commission of the European Communities","year":"1991","key":"e_1_2_1_17_1","unstructured":"Information technology security evaluation criteria (ITSEC). Version 1.2 , Commission of the European Communities , Brussels, Belgium , June 1991 . URL: http:\/\/www.ssi.gouv.fr\/site_documents\/ITSEC\/ITSEC-uk.pdf. Information technology security evaluation criteria (ITSEC). Version 1.2, Commission of the European Communities, Brussels, Belgium, June 1991. URL: http:\/\/www.ssi.gouv.fr\/site_documents\/ITSEC\/ITSEC-uk.pdf."},{"volume-title":"Electronic signals and transmission protocols","year":"1997","key":"e_1_2_1_18_1","unstructured":"Identification cards -- Integrated circuit(s) with contacts -- Part 3 : Electronic signals and transmission protocols , Second edition. ISO Standard 7816-3, International Standards Organization , Dec. 1997 . Identification cards -- Integrated circuit(s) with contacts -- Part 3: Electronic signals and transmission protocols, Second edition. ISO Standard 7816-3, International Standards Organization, Dec. 1997."},{"volume-title":"Interindustry commands for interchange","year":"1995","key":"e_1_2_1_19_1","unstructured":"Identification cards -- Integrated circuit(s) with contacts -- Part 4 : Interindustry commands for interchange , First edition. ISO Standard 7816-4, International Standards Organization , Sept. 1995 . Identification cards -- Integrated circuit(s) with contacts -- Part 4: Interindustry commands for interchange, First edition. ISO Standard 7816-4, International Standards Organization, Sept. 1995."},{"key":"e_1_2_1_20_1","volume-title":"Multi-Organizational Mandatory Access Controls for Commercial Applications. RC 21673 (97655)","author":"Karger P. A.","year":"2000","unstructured":"P. A. Karger . Multi-Organizational Mandatory Access Controls for Commercial Applications. RC 21673 (97655) , IBM Thomas J. Watson Research Center , Yorktown Heights, NY , 22 February 2000 . URL: http:\/\/domino.watson.ibm.com\/library\/CyberDig.nsf\/home. P. A. Karger. Multi-Organizational Mandatory Access Controls for Commercial Applications. RC 21673 (97655), IBM Thomas J. Watson Research Center, Yorktown Heights, NY, 22 February 2000. URL: http:\/\/domino.watson.ibm.com\/library\/CyberDig.nsf\/home."},{"key":"e_1_2_1_21_1","volume-title":"A New Mandatory Security Policy Combining Secrecy and Integrity. RC 21717 (97406)","author":"Karger P. A.","year":"2000","unstructured":"P. A. Karger , V. R. Austel , and D. C. Toll . A New Mandatory Security Policy Combining Secrecy and Integrity. RC 21717 (97406) , IBM Thomas J. Watson Research Center , Yorktown Heights, NY , 15 March 2000 . URL: http:\/\/domino.watson.ibm.com\/library\/CyberDig.nsf\/home. P. A. Karger, V. R. Austel, and D. C. Toll. A New Mandatory Security Policy Combining Secrecy and Integrity. RC 21717 (97406), IBM Thomas J. Watson Research Center, Yorktown Heights, NY, 15 March 2000. URL: http:\/\/domino.watson.ibm.com\/library\/CyberDig.nsf\/home."},{"key":"e_1_2_1_22_1","series-title":"Lecture Notes in Computer Science","first-page":"143","volume-title":"Proceedings of Crypto '99","author":"Kocher P.","year":"1999","unstructured":"P. Kocher , J. Jaffe , and B. Jun . Differential Power Analysis: Leaking Secrets . In Proceedings of Crypto '99 , Lecture Notes in Computer Science , Vol. 1666 , Springer Verlag , pages 143 -- 161 , Santa Barbara, CA, August 1999 . P. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis: Leaking Secrets. In Proceedings of Crypto '99, Lecture Notes in Computer Science, Vol. 1666, Springer Verlag, pages 143--161, Santa Barbara, CA, August 1999."},{"key":"e_1_2_1_23_1","first-page":"399","volume-title":"Advances in Cryptology -- CRYPTO 2003 Proceesings","author":"Krawczyk H.","year":"2003","unstructured":"H. Krawczyk . SIGMA : the 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and its Use in the IKE Protocols . In Advances in Cryptology -- CRYPTO 2003 Proceesings , pages 399 -- 424 , Santa Barbara, CA , 17--21 August 2003 . Lecture Notes in Computer Science , Vol. 2729 , Springer Verlag. H. Krawczyk. SIGMA: the 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and its Use in the IKE Protocols. In Advances in Cryptology -- CRYPTO 2003 Proceesings, pages 399--424, Santa Barbara, CA, 17--21 August 2003. Lecture Notes in Computer Science, Vol. 2729, Springer Verlag."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2005.05.001"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/646648.759411"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39650-5_11"},{"key":"e_1_2_1_27_1","volume-title":"The design and specification of a security kernel for the PDP-11\/45. ESD-TR-75-69","author":"Schiller W. L.","year":"1975","unstructured":"W. L. Schiller . The design and specification of a security kernel for the PDP-11\/45. ESD-TR-75-69 , The MITRE Corporation , Bedford, MA , HQ Electronic Systems Division, Hanscom AFB, MA, May 1975 . URL: http:\/\/csrc.nist.gov\/publications\/history\/schi75.pdf. W. L. Schiller. The design and specification of a security kernel for the PDP-11\/45. ESD-TR-75-69, The MITRE Corporation, Bedford, MA, HQ Electronic Systems Division, Hanscom AFB, MA, May 1975. URL: http:\/\/csrc.nist.gov\/publications\/history\/schi75.pdf."},{"key":"e_1_2_1_28_1","volume-title":"MA","author":"Whitmore J.","year":"1973","unstructured":"J. Whitmore , A. Bensoussan , P. Green , D. Hunt , A. Kobziar , and J. Stern . Design for Multics security enhancements. ESD-TR-74-176, Honeywell Information Systems, Inc., HQ Electronic Systems Division, Hanscom AFB , MA , Dec. 1973 . URL: http:\/\/csrc.nist.gov\/publications\/history\/whit74.pdf. J. Whitmore, A. Bensoussan, P. Green, D. Hunt, A. Kobziar, and J. Stern. Design for Multics security enhancements. ESD-TR-74-176, Honeywell Information Systems, Inc., HQ Electronic Systems Division, Hanscom AFB, MA, Dec. 1973. URL: http:\/\/csrc.nist.gov\/publications\/history\/whit74.pdf."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1325851.1325986"}],"container-title":["ACM SIGOPS Operating Systems Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1341312.1341320","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1341312.1341320","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:39:14Z","timestamp":1750253954000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1341312.1341320"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,1]]}},"alternative-id":["10.1145\/1341312.1341320"],"URL":"https:\/\/doi.org\/10.1145\/1341312.1341320","relation":{},"ISSN":["0163-5980"],"issn-type":[{"type":"print","value":"0163-5980"}],"subject":[],"published":{"date-parts":[[2008,1]]},"assertion":[{"value":"2008-01-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}