Künnemann, 2014 - Google Patents
Foundations for analyzing security APIs in the symbolic and computational modelKünnemann, 2014
View PDF- Document ID
- 11749097212537070096
- Author
- Künnemann R
- Publication year
External Links
Snippet
Security critical applications often store keys on dedicated HSM or key-management servers to separate highly sensitive cryptographic operations from more vulnerable parts of the network. Access to such devices is given to protocol parties by the means of Security APIs …
- 239000008186 active pharmaceutical agent 0 title abstract description 138
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4018—Transaction verification using the card verification value [CVV] associated with the card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Egele et al. | An empirical study of cryptographic misuse in android applications | |
van Oorschot | Computer Security and the Internet | |
Künnemann et al. | YubiSecure? Formal security analysis results for the Yubikey and YubiHSM | |
Lee | Security basics for computer architects | |
Bella | Inductive verification of cryptographic protocols | |
Delaune et al. | A formal analysis of authentication in the TPM | |
Bhargavan et al. | Verified implementations of the information card federated identity-management protocol | |
CN113014444A (en) | Internet of things equipment production test system and safety protection method | |
Brandão et al. | Toward Mending Two Nation-Scale Brokered Identification Systems. | |
Cairns et al. | Security analysis of the W3C web cryptography API | |
Gancher et al. | Owl: Compositional verification of security protocols via an information-flow type system | |
Cachin et al. | A secure cryptographic token interface | |
Focardi et al. | An introduction to security API analysis | |
Sfaxi et al. | Information flow control of component‐based distributed systems | |
Künnemann | Automated backward analysis of PKCS# 11 v2. 20 | |
Künnemann | Foundations for analyzing security APIs in the symbolic and computational model | |
Shao et al. | Formal analysis of HMAC authorisation in the TPM2. 0 specification | |
Zhang et al. | Formal analysis of TPM2. 0 key management APIs | |
Milner | Detecting the misuse of secrets: foundations, protocols, and verification | |
Hirschi | Automated Verification of Privacy in Security Protocols: Back and Forth Between Theory & Practice | |
Schmidt | ASITA: Advanced security infrastructure for multi-agent-applications in the telematic area | |
Rahaeimehr | Novel Cryptographic Authentication Mechanisms for Supply Chains and OpenStack | |
MAFFEI et al. | Sylvie BOLDO Présidente | |
Deraj | Quantum-safe Remote Attestation | |
De Siena | Direct Anonymous Attestation |