The goal of this paper is to report on the development of a tool aimed at the automatic detection of attacks against PKCS#11 devices. Instead of modifying or configuring the API, we propose a stateful run-time monitor which is able to track key usage over time, for the identification of operations that might result in the leakage of sensitive keys. We briefly report on the components developed for implementing the monitor and discuss new challenges and open issues.
|Data di pubblicazione:||2015|
|Titolo:||Run-time analysis of PKCS#11 attacks|
|Titolo del libro:||8th International Workshop on Analysis of Security APIs (ASA-8)|
|Appare nelle tipologie:||4.2 Abstract in Atti di convegno|