메뉴 건너뛰기




Volumn , Issue , 2008, Pages 331-344

Formal analysis of PKCS#11

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTABILITY AND DECIDABILITY; COMPUTER NETWORKS; FORMAL LOGIC; FORMAL METHODS; FOUNDATIONS; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 51749109372     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2008.16     Document Type: Conference Paper
Times cited : (37)

References (19)
  • 1
    • 0035475290 scopus 로고    scopus 로고
    • API level attacks on embedded systems
    • October
    • M. Bond and R. Anderson. API level attacks on embedded systems. IEEE Computer Magazine, pages 67-75, October 2001.
    • (2001) IEEE Computer Magazine , pp. 67-75
    • Bond, M.1    Anderson, R.2
  • 2
    • 33749446224 scopus 로고    scopus 로고
    • Hierarchical combination of intruder theories
    • Proc. 17th International Conference on Term Rewriting and Applications RTA'06, of, Seattle, USA, Springer
    • Y. Chevalier and M. Rusinowitch. Hierarchical combination of intruder theories. In Proc. 17th International Conference on Term Rewriting and Applications (RTA'06), volume 4098 of LNCS, pages 108-122, Seattle, USA, 2006. Springer.
    • (2006) LNCS , vol.4098 , pp. 108-122
    • Chevalier, Y.1    Rusinowitch, M.2
  • 3
    • 84937557946 scopus 로고    scopus 로고
    • NuSMV Version 2: An OpenSource Tool for Symbolic Model Checking
    • Proc. International Conference on Computer-Aided Verification CAV'02, of, Copenhagen, Denmark, July, Springer
    • A. Cimatti, E. Clarke, E. Giunchiglia, F. Giunchiglia, M. Pistore, M. Roveri, R. Sebastiani, and A. Tacchella. NuSMV Version 2: An OpenSource Tool for Symbolic Model Checking. In Proc. International Conference on Computer-Aided Verification (CAV'02), volume 2404 of LNCS, pages 359-364, Copenhagen, Denmark, July 2002. Springer.
    • (2002) LNCS , vol.2404 , pp. 359-364
    • Cimatti, A.1    Clarke, E.2    Giunchiglia, E.3    Giunchiglia, F.4    Pistore, M.5    Roveri, M.6    Sebastiani, R.7    Tacchella, A.8
  • 4
    • 35248891063 scopus 로고    scopus 로고
    • Proceedings of the 5th International Worshop on Cryptographic Hardware and Embedded Systems (CHES'03)
    • On the security of PKCS#11, of, Cologne, Germany, Springer
    • J. Clulow. On the security of PKCS#11. In Proceedings of the 5th International Worshop on Cryptographic Hardware and Embedded Systems (CHES'03), volume 2779 of LNCS, pages 411-425, Cologne, Germany, 2003. Springer.
    • (2003) LNCS , vol.2779 , pp. 411-425
    • Clulow, J.1
  • 6
    • 35048861214 scopus 로고    scopus 로고
    • Automatic analysis of the security of xor-based key management schemes
    • Proceedings of the 13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems TACAS'07, of, Braga, Portugal, Springer
    • V. Cortier, G. Keighren, and G. Steel. Automatic analysis of the security of xor-based key management schemes. In Proceedings of the 13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'07), volume 4424 of LNCS, pages 538-552, Braga, Portugal, 2007. Springer.
    • (2007) LNCS , vol.4424 , pp. 538-552
    • Cortier, V.1    Keighren, G.2    Steel, G.3
  • 8
    • 0016543936 scopus 로고
    • Guarded commands, nondeterminacy and formal derivation of programs
    • E. W. Dijkstra. Guarded commands, nondeterminacy and formal derivation of programs. Commun. ACM, 18(8):453-457, 1975.
    • (1975) Commun. ACM , vol.18 , Issue.8 , pp. 453-457
    • Dijkstra, E.W.1
  • 9
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • March
    • D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions in Information Theory, 2(29):198-208, March 1983.
    • (1983) IEEE Transactions in Information Theory , vol.2 , Issue.29 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 10
    • 3042538605 scopus 로고    scopus 로고
    • Multiset rewriting and the complexity of bounded security protocols
    • N. A. Durgin, P. Lincoln, and J. C. Mitchell. Multiset rewriting and the complexity of bounded security protocols. Journal of Computer Security, 12(2):247-311, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.2 , pp. 247-311
    • Durgin, N.A.1    Lincoln, P.2    Mitchell, J.C.3
  • 11
    • 33747255010 scopus 로고    scopus 로고
    • Applying protocol analysis to security device interfaces
    • July-Aug
    • J. Herzog. Applying protocol analysis to security device interfaces. IEEE Security & Privacy Magazine, 4(4):84-87, July-Aug 2006.
    • (2006) IEEE Security & Privacy Magazine , vol.4 , Issue.4 , pp. 84-87
    • Herzog, J.1
  • 12
    • 0026837069 scopus 로고
    • An automatic search for security flaws in key management schemes
    • March
    • D. Longley and S. Rigby. An automatic search for security flaws in key management schemes. Computers and Security, 11(1):75-89, March 1992.
    • (1992) Computers and Security , vol.11 , Issue.1 , pp. 75-89
    • Longley, D.1    Rigby, S.2
  • 13
    • 84947295756 scopus 로고    scopus 로고
    • Multiset rewriting and security protocol analysis
    • Proc. 13th International Conference on Rewriting Techniques and Applications RTA'02, of, Copenhagen, Denmark, Springer
    • J. C. Mitchell. Multiset rewriting and security protocol analysis. In Proc. 13th International Conference on Rewriting Techniques and Applications (RTA'02), volume 2378 of LNCS, pages 19-22, Copenhagen, Denmark, 2002. Springer.
    • (2002) LNCS , vol.2378 , pp. 19-22
    • Mitchell, J.C.1
  • 14
    • 51749102070 scopus 로고    scopus 로고
    • RSA Security Inc., v2.20. PKCS #11: Cryptographic Token Interface Standard., June 2004.
    • RSA Security Inc., v2.20. PKCS #11: Cryptographic Token Interface Standard., June 2004.
  • 15
    • 26944468299 scopus 로고    scopus 로고
    • Deduction with XOR constraints in security API modelling
    • Proceedings of the 20th International Conference on Automated Deduction CADE'05, of, Tallinn, Estonia, Springer
    • G. Steel. Deduction with XOR constraints in security API modelling. In Proceedings of the 20th International Conference on Automated Deduction (CADE'05), volume 3632 of LNCS, pages 322-336, Tallinn, Estonia, 2005. Springer.
    • (2005) LNCS , vol.3632 , pp. 322-336
    • Steel, G.1
  • 16
    • 51749122352 scopus 로고    scopus 로고
    • F. L. Tiplea, C. Enea, and C. V. Birjoveanu. Decidability and complexity results for security protocols. In Proceedings of the Verification of Infinite-State Systems with Applications to Security (VISSAS'05), 1 of NATO Security through Science Series D: Information and Communication Security, pages 185-211. IOS Press, 2005.
    • F. L. Tiplea, C. Enea, and C. V. Birjoveanu. Decidability and complexity results for security protocols. In Proceedings of the Verification of Infinite-State Systems with Applications to Security (VISSAS'05), volume 1 of NATO Security through Science Series D: Information and Communication Security, pages 185-211. IOS Press, 2005.
  • 17
    • 51749108116 scopus 로고    scopus 로고
    • E. Tsalapati. Analysis of PKCS#11 using AVISPA tools. Master's thesis, University of Edinburgh, 2007.
    • E. Tsalapati. Analysis of PKCS#11 using AVISPA tools. Master's thesis, University of Edinburgh, 2007.
  • 19
    • 35048819862 scopus 로고    scopus 로고
    • Robbing the bank with a theorem prover
    • Technical Report UCAM-CL-TR-644, University of Cambridge, August
    • P. Youn, B. Adida, M. Bond, J. Clulow, J. Herzog, A. Lin, R. Rivest, and R. Anderson. Robbing the bank with a theorem prover. Technical Report UCAM-CL-TR-644, University of Cambridge, August 2005.
    • (2005)
    • Youn, P.1    Adida, B.2    Bond, M.3    Clulow, J.4    Herzog, J.5    Lin, A.6    Rivest, R.7    Anderson, R.8


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.