The goal of this paper is to report on the development of a tool aimed at the automatic detection of attacks against PKCS#11 devices. Instead of modifying or configuring the API, we propose a stateful run-time monitor which is able to track key usage over time, for the identification of operations that might result in the leakage of sensitive keys. We briefly report on the components developed for implementing the monitor and discuss new challenges and open issues.

Run-time analysis of PKCS#11 attacks

CAIAZZA, GIANLUCA;FOCARDI, Riccardo;SQUARCINA, MARCO
2015-01-01

Abstract

The goal of this paper is to report on the development of a tool aimed at the automatic detection of attacks against PKCS#11 devices. Instead of modifying or configuring the API, we propose a stateful run-time monitor which is able to track key usage over time, for the identification of operations that might result in the leakage of sensitive keys. We briefly report on the components developed for implementing the monitor and discuss new challenges and open issues.
2015
8th International Workshop on Analysis of Security APIs (ASA-8)
File in questo prodotto:
File Dimensione Formato  
ASA8_run-time_analysis_of_PKCS11_attacks.pdf

accesso aperto

Descrizione: Articolo principale
Tipologia: Abstract
Licenza: Accesso gratuito (solo visione)
Dimensione 179.67 kB
Formato Adobe PDF
179.67 kB Adobe PDF Visualizza/Apri

I documenti in ARCA sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10278/3660277
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact