[go: up one dir, main page]

Künnemann, 2014 - Google Patents

Foundations for analyzing security APIs in the symbolic and computational model

Künnemann, 2014

View PDF
Document ID
11749097212537070096
Author
Künnemann R
Publication year

External Links

Snippet

Security critical applications often store keys on dedicated HSM or key-management servers to separate highly sensitive cryptographic operations from more vulnerable parts of the network. Access to such devices is given to protocol parties by the means of Security APIs …
Continue reading at theses.hal.science (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4018Transaction verification using the card verification value [CVV] associated with the card
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Similar Documents

Publication Publication Date Title
Egele et al. An empirical study of cryptographic misuse in android applications
van Oorschot Computer Security and the Internet
Künnemann et al. YubiSecure? Formal security analysis results for the Yubikey and YubiHSM
Lee Security basics for computer architects
Bella Inductive verification of cryptographic protocols
Delaune et al. A formal analysis of authentication in the TPM
Bhargavan et al. Verified implementations of the information card federated identity-management protocol
CN113014444A (en) Internet of things equipment production test system and safety protection method
Brandão et al. Toward Mending Two Nation-Scale Brokered Identification Systems.
Cairns et al. Security analysis of the W3C web cryptography API
Gancher et al. Owl: Compositional verification of security protocols via an information-flow type system
Cachin et al. A secure cryptographic token interface
Focardi et al. An introduction to security API analysis
Sfaxi et al. Information flow control of component‐based distributed systems
Künnemann Automated backward analysis of PKCS# 11 v2. 20
Künnemann Foundations for analyzing security APIs in the symbolic and computational model
Shao et al. Formal analysis of HMAC authorisation in the TPM2. 0 specification
Zhang et al. Formal analysis of TPM2. 0 key management APIs
Milner Detecting the misuse of secrets: foundations, protocols, and verification
Hirschi Automated Verification of Privacy in Security Protocols: Back and Forth Between Theory & Practice
Schmidt ASITA: Advanced security infrastructure for multi-agent-applications in the telematic area
Rahaeimehr Novel Cryptographic Authentication Mechanisms for Supply Chains and OpenStack
MAFFEI et al. Sylvie BOLDO Présidente
Deraj Quantum-safe Remote Attestation
De Siena Direct Anonymous Attestation