An automatic search for security flaws in key management schemes
Computers and Security
Attacks on Cryptoprocessor Transaction Sets
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Experience Using a Low-Cost FPGA Design to Crack DES Keys
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
SAT-based model-checking for security protocols analysis
International Journal of Information Security
CSF '08 Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium
A Secure Cryptographic Token Interface
CSF '09 Proceedings of the 2009 22nd IEEE Computer Security Foundations Symposium
Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data
Foundations and Applications of Security Analysis
A generic security API for symmetric key management on cryptographic devices
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Formal security analysis of PKCS#11 and proprietary extensions
Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07)
Information Security Tech. Report
Towards formal validation of trust and security in the internet of services
The future internet
An introduction to security API analysis
Foundations of security analysis and design VI
A linux kernel cryptographic framework: decoupling cryptographic keys from applications
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Privacy supporting cloud computing: confichair, a case study
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Type-Based analysis of PKCS#11 key management
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Concepts and proofs for configuring PKCS#11
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
From model-checking to automated testing of security protocols: bridging the gap
TAP'12 Proceedings of the 6th international conference on Tests and Proofs
New privacy issues in mobile telephony: fix and verification
Proceedings of the 2012 ACM conference on Computer and communications security
Neighborhood watch: security and privacy analysis of automatic meter reading systems
Proceedings of the 2012 ACM conference on Computer and communications security
Privacy-supporting cloud computing by in-browser key translation
Journal of Computer Security - Security and Trust Principles
Type-based analysis of key management in PKCS#11 cryptographic devices
Journal of Computer Security - Security and Trust Principles
Hi-index | 0.00 |
We show how to extract sensitive cryptographic keys from a variety of commercially available tamper resistant cryptographic security tokens, exploiting vulnerabilities in their RSA PKCS#11 based APIs. The attacks are performed by Tookan, an automated tool we have developed, which reverse-engineers the particular token in use to deduce its functionality, constructs a model of its API for a model checker, and then executes any attack trace found by the model checker directly on the token. We describe the operation of Tookan and give results of testing the tool on 17 commercially available tokens: 9 were vulnerable to attack, while the other 8 had severely restricted functionality. One of the attacks found by the model checker has not previously appeared in the literature. We show how Tookan may be used to verify patches to insecure devices, and give a secure configuration that we have implemented in a patch to a software token simulator. This is the first such configuration to appear in the literature that does not require any new cryptographic mechanisms to be added to the standard. We comment on lessons for future key management APIs.