Analysis of the PKCS#11 API using the maude-NPA tool

7Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cryptographic Application Programmer Interfaces (Crypto APIs) are designed to allow a secure interoperation between applications and cryptographic devices such as smartcards and Hardware Security Modules (HSMs). However, several Crypto APIs have been shown to be subject to attacks in which sensitive information is disclosed to an attacker, such as the RSA Laboratories Public Key Standards PKCS#11, an API widely adopted in industry. Recently, there has been a growing interest on applying automated crypto protocol analysis methods to formally analyze APIs. However, the PKCS#11 has been proven difficult to analyze using such methods since it involves non-monotonic mutable global state. In this paper we specify and analyze the PKCS#11 in Maude-NPA, a general purpose crypto protocol analysis tool.

Cite

CITATION STYLE

APA

González-Burgueño, A., Santiago, S., Escobar, S., Meadows, C., & Meseguer, J. (2015). Analysis of the PKCS#11 API using the maude-NPA tool. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9497, pp. 86–106). Springer Verlag. https://doi.org/10.1007/978-3-319-27152-1_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free