Abstract. We extend Delaune, Kremer and Steel’s framework for anal-ysis of PKCS#11-based APIs from bounded to unbounded fresh data. We achieve this by: formally defining the notion of an attribute policy; showing that a well-designed API should have a certain class of policy we call complete; showing that APIs with complete policies may be safely abstracted to APIs where the attributes are fixed; and proving that these static APIs can be analysed in a small bounded model such that secu-rity properties will hold for the unbounded case. We automate analysis in our framework using the SAT-based security protocol model checker SATMC. We show that a symmetric key management subset of the Era-com PKCS#11 API, used in their ProtectServer product, ...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulner- able to attacks which...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulner- able to attacks which...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulner- able to attacks which...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
We present the design of a new symmetric key management API for cryptographic devices intended to im...
International audienceWe present the design of a new symmetric key management API for cryptographic ...
International audienceWe present the design of a new symmetric key management API for cryptographic ...
International audienceWe present an analysis of key wrapping APIs with generic policies. We prove th...
PKCS#11 is a standard API to cryptographic devices such as smarcards, hardware security modules and ...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulner- able to attacks which...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulner- able to attacks which...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulner- able to attacks which...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulner- able to attacks which...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulnerable to attacks which c...
We present the design of a new symmetric key management API for cryptographic devices intended to im...
International audienceWe present the design of a new symmetric key management API for cryptographic ...
International audienceWe present the design of a new symmetric key management API for cryptographic ...
International audienceWe present an analysis of key wrapping APIs with generic policies. We prove th...
PKCS#11 is a standard API to cryptographic devices such as smarcards, hardware security modules and ...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulner- able to attacks which...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulner- able to attacks which...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulner- able to attacks which...
PKCS#11, is a security API for cryptographic tokens. It is known to be vulner- able to attacks which...